id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0901.0179 | Janardan Misra | Janardan Misra and Suman Roy | Techniques for Distributed Reachability Analysis with Partial Order and
Symmetry based Reductions | null | null | null | null | cs.DC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we propose techniques for efficient reachability analysis of the
state space (e.g., detection of bad states) using a combination of partial
order and symmetry based reductions in a distributed setting. The proposed
techniques are focused towards explicit state space enumeration based
model-checkers like SPIN. We consider variants for both depth-first as well as
breadth-first based generation of the reduced state graphs on-the-fly.
| [
{
"version": "v1",
"created": "Thu, 1 Jan 2009 15:29:28 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Misra",
"Janardan",
""
],
[
"Roy",
"Suman",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0901.0205 | Julia Chuzhoy | Deeparnab Chakrabarty, Julia Chuzhoy, Sanjeev Khanna | On Allocating Goods to Maximize Fairness | 35 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a set of $m$ agents and a set of $n$ items, where agent $A$ has utility
$u_{A,i}$ for item $i$, our goal is to allocate items to agents to maximize
fairness. Specifically, the utility of an agent is the sum of its utilities for
items it receives, and we seek to maximize the minimum utility of any agent.
While this problem has received much attention recently, its approximability
has not been well-understood thus far: the best known approximation algorithm
achieves an $\tilde{O}(\sqrt{m})$-approximation, and in contrast, the best
known hardness of approximation stands at 2.
Our main result is an approximation algorithm that achieves an
$\tilde{O}(n^{\eps})$ approximation for any $\eps=\Omega(\log\log n/\log n)$ in
time $n^{O(1/\eps)}$. In particular, we obtain poly-logarithmic approximation
in quasi-polynomial time, and for any constant $\eps > 0$, we obtain
$O(n^{\eps})$ approximation in polynomial time. An interesting aspect of our
algorithm is that we use as a building block a linear program whose integrality
gap is $\Omega(\sqrt m)$. We bypass this obstacle by iteratively using the
solutions produced by the LP to construct new instances with significantly
smaller integrality gaps, eventually obtaining the desired approximation.
We also investigate the special case of the problem, where every item has a
non-zero utility for at most two agents. We show that even in this restricted
setting the problem is hard to approximate upto any factor better tha 2, and
show a factor $(2+\eps)$-approximation algorithm running in time
$poly(n,1/\eps)$ for any $\eps>0$. This special case can be cast as a graph
edge orientation problem, and our algorithm can be viewed as a generalization
of Eulerian orientations to weighted graphs.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 01:24:26 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Chakrabarty",
"Deeparnab",
""
],
[
"Chuzhoy",
"Julia",
""
],
[
"Khanna",
"Sanjeev",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.0213 | Maurice H. T. Ling | Maurice HT Ling, Christophe Lefevre, Kevin R. Nicholas | Filtering Microarray Correlations by Statistical Literature Analysis
Yields Potential Hypotheses for Lactation Research | null | Ling, MHT, Lefevre, C, Nicholas, KR. 2008. Filtering Microarray
Correlations by Statistical Literature Analysis Yields Potential Hypotheses
for Lactation Research. The Python Papers 3(3): 4 | null | null | cs.DL cs.DB | http://creativecommons.org/licenses/by/3.0/ | Our results demonstrated that a previously reported protein name
co-occurrence method (5-mention PubGene) which was not based on a hypothesis
testing framework, it is generally statistically more significant than the 99th
percentile of Poisson distribution-based method of calculating co-occurrence.
It agrees with previous methods using natural language processing to extract
protein-protein interaction from text as more than 96% of the interactions
found by natural language processing methods to overlap with the results from
5-mention PubGene method. However, less than 2% of the gene co-expressions
analyzed by microarray were found from direct co-occurrence or interaction
information extraction from the literature. At the same time, combining
microarray and literature analyses, we derive a novel set of 7 potential
functional protein-protein interactions that had not been previously described
in the literature.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 03:47:57 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Ling",
"Maurice HT",
""
],
[
"Lefevre",
"Christophe",
""
],
[
"Nicholas",
"Kevin R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0901.0220 | Gerhard Kramer | Gerhard Kramer and Chandra Nair | Comments on "Broadcast Channels with Arbitrarily Correlated Sources" | 3 pages, 1 figure, submitted for presentation at the 2009 IEEE
International Symposium on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Marton-Gelfand-Pinsker inner bound on the capacity region of broadcast
channels was extended by Han-Costa to include arbitrarily correlated sources
where the capacity region is replaced by an admissible source region. The main
arguments of Han-Costa are correct but unfortunately the authors overlooked an
inequality in their derivation. The corrected region is presented and the
absence of the omitted inequality is shown to sometimes admit sources that are
not admissible.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 08:37:07 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Kramer",
"Gerhard",
""
],
[
"Nair",
"Chandra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0222 | Damien Chablat | Liang Ma (IRCCyN), Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Wei
Zhang (DIE) | Dynamic Muscle Fatigue Evaluation in Virtual Working Environment | null | International Journal of Industrial Ergonomics 39, 1 (2009)
211-220 | 10.1016/j.ergon.2008.04.004 | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Musculoskeletal disorder (MSD) is one of the major health problems in
mechanical work especially in manual handling jobs. Muscle fatigue is believed
to be the main reason for MSD. Posture analysis techniques have been used to
expose MSD risks of the work, but most of the conventional methods are only
suitable for static posture analysis. Meanwhile the subjective influences from
the inspectors can result differences in the risk assessment. Another
disadvantage is that the evaluation has to be taken place in the workshop, so
it is impossible to avoid some design defects before data collection in the
field environment and it is time consuming. In order to enhance the efficiency
of ergonomic MSD risk evaluation and avoid subjective influences, we develop a
new muscle fatigue model and a new fatigue index to evaluate the human muscle
fatigue during manual handling jobs in this paper. Our new fatigue model is
closely related to the muscle load during working procedure so that it can be
used to evaluate the dynamic working process. This muscle fatigue model is
mathematically validated and it is to be further experimental validated and
integrated into a virtual working environment to evaluate the muscle fatigue
and predict the MSD risks quickly and objectively.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 08:49:04 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Ma",
"Liang",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Zhang",
"Wei",
"",
"DIE"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0901.0252 | Amir Leshem | Amir Leshem and Jacob Goldberger | MIMO decoding based on stochastic reconstruction from multiple
projections | To appear in Proc. of ICASSP 2009 | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Least squares (LS) fitting is one of the most fundamental techniques in
science and engineering. It is used to estimate parameters from multiple noisy
observations. In many problems the parameters are known a-priori to be bounded
integer valued, or they come from a finite set of values on an arbitrary finite
lattice. In this case finding the closest vector becomes NP-Hard problem. In
this paper we propose a novel algorithm, the Tomographic Least Squares Decoder
(TLSD), that not only solves the ILS problem, better than other sub-optimal
techniques, but also is capable of providing the a-posteriori probability
distribution for each element in the solution vector. The algorithm is based on
reconstruction of the vector from multiple two-dimensional projections. The
projections are carefully chosen to provide low computational complexity.
Unlike other iterative techniques, such as the belief propagation, the proposed
algorithm has ensured convergence. We also provide simulated experiments
comparing the algorithm to other sub-optimal algorithms.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 16:46:05 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Leshem",
"Amir",
""
],
[
"Goldberger",
"Jacob",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0269 | Daniel Lucani | Daniel E. Lucani, Milica Stojanovic, Muriel M\'edard | Random Linear Network Coding For Time Division Duplexing: Energy
Analysis | 5 pages, 6 figures, Accepted to ICC 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the energy performance of random linear network coding for time
division duplexing channels. We assume a packet erasure channel with nodes that
cannot transmit and receive information simultaneously. The sender transmits
coded data packets back-to-back before stopping to wait for the receiver to
acknowledge the number of degrees of freedom, if any, that are required to
decode correctly the information. Our analysis shows that, in terms of mean
energy consumed, there is an optimal number of coded data packets to send
before stopping to listen. This number depends on the energy needed to transmit
each coded packet and the acknowledgment (ACK), probabilities of packet and ACK
erasure, and the number of degrees of freedom that the receiver requires to
decode the data. We show that its energy performance is superior to that of a
full-duplex system. We also study the performance of our scheme when the number
of coded packets is chosen to minimize the mean time to complete transmission
as in [1]. Energy performance under this optimization criterion is found to be
close to optimal, thus providing a good trade-off between energy and time
required to complete transmissions.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 18:40:42 GMT"
}
]
| 2009-01-05T00:00:00 | [
[
"Lucani",
"Daniel E.",
""
],
[
"Stojanovic",
"Milica",
""
],
[
"Médard",
"Muriel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0275 | Willie Harrison | Willie K Harrison and Steven W. McLaughlin | Physical-Layer Security: Combining Error Control Coding and Cryptography | 12 pages, 5 figures. Submitted and accepted to the International
Conference on Communications (ICC) 2009. v2: equivalent to the version that
will be published in the conference proceedings. Has some altered notation
from version 1 as well as slight changes in the wording to make the paper
more readable and easier to understand | null | 10.1109/ICC.2009.5199337 | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider tandem error control coding and cryptography in the
setting of the {\em wiretap channel} due to Wyner. In a typical communications
system a cryptographic application is run at a layer above the physical layer
and assumes the channel is error free. However, in any real application the
channels for friendly users and passive eavesdroppers are not error free and
Wyner's wiretap model addresses this scenario. Using this model, we show the
security of a common cryptographic primitive, i.e. a keystream generator based
on linear feedback shift registers (LFSR), can be strengthened by exploiting
properties of the physical layer. A passive eavesdropper can be made to
experience greater difficulty in cracking an LFSR-based cryptographic system
insomuch that the computational complexity of discovering the secret key
increases by orders of magnitude, or is altogether infeasible. This result is
shown for two fast correlation attacks originally presented by Meier and
Staffelbach, in the context of channel errors due to the wiretap channel model.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 20:17:39 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Apr 2009 16:41:07 GMT"
}
]
| 2015-09-24T00:00:00 | [
[
"Harrison",
"Willie K",
""
],
[
"McLaughlin",
"Steven W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0290 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Nicolae Tapus | Offline Algorithmic Techniques for Several Content Delivery Problems in
Some Restricted Types of Distributed Systems | Proceedings of the International Workshop on High Performance Grid
Middleware (HiPerGrid), pp. 65-72, Bucharest, Romania, 21-22 November, 2008.
(ISSN: 2065-0701) | Proceedings of the International Workshop on High Performance Grid
Middleware (HiPerGrid), pp. 65-72, Bucharest, Romania, 2008. (ISSN:
2065-0701) | null | null | cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider several content delivery problems (broadcast and
multicast, in particular) in some restricted types of distributed systems (e.g.
optical Grids and wireless sensor networks with tree-like topologies). For each
problem we provide efficient algorithmic techniques for computing optimal
content delivery strategies. The techniques we present are offline, which means
that they can be used only when full information is available and the problem
parameters do not fluctuate too much.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 21:53:57 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tapus",
"Nicolae",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.0291 | Mugurel Ionut Andreica | Alexandra Carpen-Amarie, Mugurel Ionut Andreica, Valentin Cristea | An Algorithm for File Transfer Scheduling in Grid Environments | Proceedings of the International Workshop on High Performance Grid
Middleware (HiPerGrid), pp. 33-40, Bucharest, Romania, 21-22 November, 2008.
(ISSN: 2065-0701) | Proceedings of the International Workshop on High Performance Grid
Middleware (HiPerGrid), pp. 33-40, Bucharest, Romania, 2008. (ISSN:
2065-0701) | null | null | cs.NI cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the data transfer scheduling problem for Grid
environments, presenting a centralized scheduler developed with dynamic and
adaptive features. The algorithm offers a reservation system for user transfer
requests that allocates them transfer times and bandwidth, according to the
network topology and the constraints the user specified for the requests. This
paper presents the projects related to the data transfer field, the design of
the framework for which the scheduler was built, the main features of the
scheduler, the steps for transfer requests rescheduling and two tests that
illustrate the system's behavior for different types of transfer requests.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 22:03:02 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Carpen-Amarie",
"Alexandra",
""
],
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Cristea",
"Valentin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.0296 | Joseph Kong | Joseph S. Kong, Nima Sarshar, Vwani P. Roychowdhury | Experience versus Talent Shapes the Structure of the Web | null | Proceedings of the National Academy of Sciences (PNAS), Vol. 105,
Pages 13724-13729, 2008 | 10.1073/pnas.0805921105 | null | cs.CY cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We use sequential large-scale crawl data to empirically investigate and
validate the dynamics that underlie the evolution of the structure of the web.
We find that the overall structure of the web is defined by an intricate
interplay between experience or entitlement of the pages (as measured by the
number of inbound hyperlinks a page already has), inherent talent or fitness of
the pages (as measured by the likelihood that someone visiting the page would
give a hyperlink to it), and the continual high rates of birth and death of
pages on the web. We find that the web is conservative in judging talent and
the overall fitness distribution is exponential, showing low variability. The
small variance in talent, however, is enough to lead to experience
distributions with high variance: The preferential attachment mechanism
amplifies these small biases and leads to heavy-tailed power-law (PL) inbound
degree distributions over all pages, as well as over pages that are of the same
age. The balancing act between experience and talent on the web allows newly
introduced pages with novel and interesting content to grow quickly and surpass
older pages. In this regard, it is much like what we observe in high-mobility
and meritocratic societies: People with entitlement continue to have access to
the best resources, but there is just enough screening for fitness that allows
for talented winners to emerge and join the ranks of the leaders. Finally, we
show that the fitness estimates have potential practical applications in
ranking query results.
| [
{
"version": "v1",
"created": "Fri, 2 Jan 2009 23:11:08 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Kong",
"Joseph S.",
""
],
[
"Sarshar",
"Nima",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0901.0317 | Janardan Misra | Janardan Misra | Design of a P System based Artificial Graph Chemistry | 13 pages | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Chemistries (ACs) are symbolic chemical metaphors for the
exploration of Artificial Life, with specific focus on the origin of life. In
this work we define a P system based artificial graph chemistry to understand
the principles leading to the evolution of life-like structures in an AC set up
and to develop a unified framework to characterize and classify symbolic
artificial chemistries by devising appropriate formalism to capture semantic
and organizational information. An extension of P system is considered by
associating probabilities with the rules providing the topological framework
for the evolution of a labeled undirected graph based molecular reaction
semantics.
| [
{
"version": "v1",
"created": "Sat, 3 Jan 2009 17:35:49 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Misra",
"Janardan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.0318 | Janardan Misra | Janrdan Misra | Thoughts on an Unified Framework for Artificial Chemistries | 17 papges | null | null | null | cs.AI cs.IT math.IT nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Chemistries (ACs) are symbolic chemical metaphors for the
exploration of Artificial Life, with specific focus on the problem of
biogenesis or the origin of life. This paper presents authors thoughts towards
defining a unified framework to characterize and classify symbolic artificial
chemistries by devising appropriate formalism to capture semantic and
organizational information. We identify three basic high level abstractions in
initial proposal for this framework viz., information, computation, and
communication. We present an analysis of two important notions of information,
namely, Shannon's Entropy and Algorithmic Information, and discuss inductive
and deductive approaches for defining the framework.
| [
{
"version": "v1",
"created": "Sat, 3 Jan 2009 17:37:15 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Misra",
"Janrdan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0901.0339 | Alexandre Riazanov | Alexandre Riazanov | Resolution-based Query Answering for Semantic Access to Relational
Databases: A Research Note | null | null | null | null | cs.LO cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the problem of semantic querying of relational databases (RDB)
modulo knowledge bases using very expressive knowledge representation
formalisms, such as full first-order logic or its various fragments. We propose
to use a first-order logic (FOL) reasoner for computing schematic answers to
deductive queries, with the subsequent instantiation of these schematic answers
using a conventional relational DBMS. In this research note, we outline the
main idea of this technique -- using abstractions of databases and constrained
clauses for deriving schematic answers. The proposed method can be directly
used with regular RDB, including legacy databases. Moreover, we propose it as a
potential basis for an efficient Web-scale semantic search technology.
| [
{
"version": "v1",
"created": "Sat, 3 Jan 2009 20:59:55 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Mar 2009 18:39:18 GMT"
},
{
"version": "v3",
"created": "Sun, 3 May 2009 14:56:14 GMT"
}
]
| 2009-05-03T00:00:00 | [
[
"Riazanov",
"Alexandre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0901.0349 | Xingang Wang Dr | Xingang Wang, Shuguang Guan, and Choy Heng Lai | Protecting infrastructure networks from cost-based attacks | 5 pages, 4 figures | null | 10.1088/1367-2630/11/3/033006 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It has been known that heterogeneous networks are vulnerable to the
intentional removal of a small fraction of highly connected or loaded nodes,
which implies that, to protect a network effectively, a few important nodes
should be allocated with more defense resources than the others. However, if
too many resources are allocated to the few important nodes, the numerous
less-important nodes will be less protected, which, when attacked all together,
still capable of causing a devastating damage. A natural question therefore is
how to efficiently distribute the limited defense resources among the network
nodes such that the network damage is minimized whatever attack strategy the
attacker may take. In this paper, taking into account the factor of attack
cost, we will revisit the problem of network security and search for efficient
network defense against the cost-based attacks. The study shows that, for a
general complex network, there will exist an optimal distribution of the
defense resources, with which the network is well protected from cost-based
attacks. Furthermore, it is found that the configuration of the optimal defense
is dependent on the network parameters. Specifically, network that has a larger
size, sparser connection and more heterogeneous structure will be more
benefited from the defense optimization.
| [
{
"version": "v1",
"created": "Sun, 4 Jan 2009 02:47:25 GMT"
}
]
| 2009-11-13T00:00:00 | [
[
"Wang",
"Xingang",
""
],
[
"Guan",
"Shuguang",
""
],
[
"Lai",
"Choy Heng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.0355 | Angel (Anxo) Sanchez | Carlos P. Roca, Jose A. Cuesta and Angel Sanchez | Promotion of cooperation on networks? The myopic best response case | null | null | 10.1140/epjb/e2009-00189-0 | null | q-bio.PE cs.GT physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the issue of the effects of considering a network of contacts on
the emergence of cooperation on social dilemmas under myopic best response
dynamics. We begin by summarizing the main features observed under less
intellectually demanding dynamics, pointing out their most relevant general
characteristics. Subsequently we focus on the new framework of best response.
By means of an extensive numerical simulation program we show that, contrary to
the rest of dynamics considered so far, best response is largely unaffected by
the underlying network, which implies that, in most cases, no promotion of
cooperation is found with this dynamics. We do find, however, nontrivial
results differing from the well-mixed population in the case of coordination
games on lattices, which we explain in terms of the formation of spatial
clusters and the conditions for their advancement, subsequently discussing
their relevance to other networks.
| [
{
"version": "v1",
"created": "Sun, 4 Jan 2009 17:29:18 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Roca",
"Carlos P.",
""
],
[
"Cuesta",
"Jose A.",
""
],
[
"Sanchez",
"Angel",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0901.0358 | Pierre-Francois Marteau | Pierre-Fran\c{c}ois Marteau (VALORIA), Gilbas M\'enier (VALORIA),
Eugen Popovici (VALORIA) | Weighted Naive Bayes Model for Semi-Structured Document Categorization | null | 1st International Conference on Multidisciplinary Information
Sciences and Technologies InSciT2006, Merida : Espagne (2006) | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is the supervised classification of semi-structured
data. A formal model based on bayesian classification is developed while
addressing the integration of the document structure into classification tasks.
We define what we call the structural context of occurrence for unstructured
data, and we derive a recursive formulation in which parameters are used to
weight the contribution of structural element relatively to the others. A
simplified version of this formal model is implemented to carry out textual
documents classification experiments. First results show, for a adhoc weighting
strategy, that the structural context of word occurrences has a significant
impact on classification results comparing to the performance of a simple
multinomial naive Bayes classifier. The proposed implementation competes on the
Reuters-21578 data with the SVM classifier associated or not with the splitting
of structural components. These results encourage exploring the learning of
acceptable weighting strategies for this model, in particular boosting
strategies.
| [
{
"version": "v1",
"created": "Sun, 4 Jan 2009 06:35:34 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Marteau",
"Pierre-François",
"",
"VALORIA"
],
[
"Ménier",
"Gilbas",
"",
"VALORIA"
],
[
"Popovici",
"Eugen",
"",
"VALORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0901.0373 | Olivier Finkel | Olivier Finkel (ELM, Lip) | Highly Undecidable Problems For Infinite Computations | to appear in RAIRO-Theoretical Informatics and Applications | RAIRO - Theoretical Informatics and Applications 43, 2 (2009)
339-364 | null | null | cs.LO cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that many classical decision problems about 1-counter
omega-languages, context free omega-languages, or infinitary rational
relations, are $\Pi_2^1$-complete, hence located at the second level of the
analytical hierarchy, and "highly undecidable". In particular, the universality
problem, the inclusion problem, the equivalence problem, the determinizability
problem, the complementability problem, and the unambiguity problem are all
$\Pi_2^1$-complete for context-free omega-languages or for infinitary rational
relations. Topological and arithmetical properties of 1-counter
omega-languages, context free omega-languages, or infinitary rational
relations, are also highly undecidable. These very surprising results provide
the first examples of highly undecidable problems about the behaviour of very
simple finite machines like 1-counter automata or 2-tape automata.
| [
{
"version": "v1",
"created": "Sun, 4 Jan 2009 13:13:32 GMT"
}
]
| 2009-08-04T00:00:00 | [
[
"Finkel",
"Olivier",
"",
"ELM, Lip"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0901.0401 | Adom Giffin | Adom Giffin | From Physics to Economics: An Econometric Example Using Maximum Relative
Entropy | This paper has been accepted in Physica A. 19 Pages, 3 Figures | Physica A 388 (2009), pp. 1610-1620 | 10.1016/j.physa.2008.12.066 | null | q-fin.ST cs.IT math.IT physics.data-an physics.pop-ph stat.CO stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Econophysics, is based on the premise that some ideas and methods from
physics can be applied to economic situations. We intend to show in this paper
how a physics concept such as entropy can be applied to an economic problem. In
so doing, we demonstrate how information in the form of observable data and
moment constraints are introduced into the method of Maximum relative Entropy
(MrE). A general example of updating with data and moments is shown. Two
specific econometric examples are solved in detail which can then be used as
templates for real world problems. A numerical example is compared to a large
deviation solution which illustrates some of the advantages of the MrE method.
| [
{
"version": "v1",
"created": "Sun, 4 Jan 2009 21:37:04 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Giffin",
"Adom",
""
]
]
| [
{
"class": "Quantitative Finance",
"code": "q-fin.ST",
"description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data",
"span": "(Statistical Finance)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.pop-ph",
"description": "Description coming soon",
"span": "(Popular Physics)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
]
|
0901.0492 | Changchuan Yin | Changchuan Yin, Long Gao, Tie Liu, and Shuguang Cui | Transmission Capacities for Overlaid Wireless Ad Hoc Networks with
Outage Constraints | 6 pages, 5 figures, accepted by IEEE ICC 2009 | null | 10.1109/ICC.2009.5199539 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the transmission capacities of two coexisting wireless networks (a
primary network vs. a secondary network) that operate in the same geographic
region and share the same spectrum. We define transmission capacity as the
product among the density of transmissions, the transmission rate, and the
successful transmission probability (1 minus the outage probability). The
primary (PR) network has a higher priority to access the spectrum without
particular considerations for the secondary (SR) network, where the SR network
limits its interference to the PR network by carefully controlling the density
of its transmitters. Assuming that the nodes are distributed according to
Poisson point processes and the two networks use different transmission ranges,
we quantify the transmission capacities for both of these two networks and
discuss their tradeoff based on asymptotic analyses. Our results show that if
the PR network permits a small increase of its outage probability, the sum
transmission capacity of the two networks (i.e., the overall spectrum
efficiency per unit area) will be boosted significantly over that of a single
network.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 15:30:35 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Yin",
"Changchuan",
""
],
[
"Gao",
"Long",
""
],
[
"Liu",
"Tie",
""
],
[
"Cui",
"Shuguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0498 | Bruno Goncalves | Bruno Goncalves and Jose J. Ramasco | Towards the characterization of individual users through Web analytics | 8 pages, 4 figures. To appear in Proceeding of Complex'09 | Complex Sciences, 2247-2254 (2009) | 10.1007/978-3-642-02469-6_102 | null | cs.HC cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We perform an analysis of the way individual users navigate in the Web. We
focus primarily in the temporal patterns of they return to a given page. The
return probability as a function of time as well as the distribution of time
intervals between consecutive visits are measured and found to be independent
of the level of activity of single users. The results indicate a rich variety
of individual behaviors and seem to preclude the possibility of defining a
characteristic frequency for each user in his/her visits to a single site.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 15:11:32 GMT"
}
]
| 2010-04-27T00:00:00 | [
[
"Goncalves",
"Bruno",
""
],
[
"Ramasco",
"Jose J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0901.0501 | Stefan Kiefer | Morten K\"uhnrich, Stefan Schwoon, Ji\v{r}\'i Srba, Stefan Kiefer | Interprocedural Dataflow Analysis over Weight Domains with Infinite
Descending Chains | technical report for a FOSSACS'09 publication | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study generalized fixed-point equations over idempotent semirings and
provide an efficient algorithm for the detection whether a sequence of Kleene's
iterations stabilizes after a finite number of steps. Previously known
approaches considered only bounded semirings where there are no infinite
descending chains. The main novelty of our work is that we deal with semirings
without the boundedness restriction. Our study is motivated by several
applications from interprocedural dataflow analysis. We demonstrate how the
reachability problem for weighted pushdown automata can be reduced to solving
equations in the framework mentioned above and we describe a few applications
to demonstrate its usability.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 16:47:21 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jan 2009 16:00:09 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Kühnrich",
"Morten",
""
],
[
"Schwoon",
"Stefan",
""
],
[
"Srba",
"Jiří",
""
],
[
"Kiefer",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.0521 | Tobias Koch | Tobias Koch and Amos Lapidoth | On Multipath Fading Channels at High SNR | Submitted to the IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work studies the capacity of multipath fading channels. A noncoherent
channel model is considered, where neither the transmitter nor the receiver is
cognizant of the realization of the path gains, but both are cognizant of their
statistics. It is shown that if the delay spread is large in the sense that the
variances of the path gains decay exponentially or slower, then capacity is
bounded in the signal-to-noise ratio (SNR). For such channels, capacity does
not tend to infinity as the SNR tends to infinity. In contrast, if the
variances of the path gains decay faster than exponentially, then capacity is
unbounded in the SNR. It is further demonstrated that if the number of paths is
finite, then at high SNR capacity grows double-logarithmically with the SNR,
and the capacity pre-loglog, defined as the limiting ratio of capacity to
log(log(SNR)) as SNR tends to infinity, is 1 irrespective of the number of
paths.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 20:59:56 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Koch",
"Tobias",
""
],
[
"Lapidoth",
"Amos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0529 | Sujit Gujar Mr | Sujit Gujar, C E Veni Madhavan | Measures for classification and detection in steganalysis | 15 pages, 8 figures | null | null | null | cs.OH cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Still and multi-media images are subject to transformations for compression,
steganographic embedding and digital watermarking. In a major program of
activities we are engaged in the modeling, design and analysis of digital
content. Statistical and pattern classification techniques should be combined
with understanding of run length, transform coding techniques, and also
encryption techniques.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 17:25:57 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Gujar",
"Sujit",
""
],
[
"Madhavan",
"C E Veni",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.0536 | Eren Sasoglu | Satish Babu Korada, Eren Sasoglu, Rudiger Urbanke | Polar Codes: Characterization of Exponent, Bounds, and Constructions | Submitted to IEEE Transactions on Information Theory, minor updates | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Polar codes were recently introduced by Ar\i kan. They achieve the capacity
of arbitrary symmetric binary-input discrete memoryless channels under a low
complexity successive cancellation decoding strategy. The original polar code
construction is closely related to the recursive construction of Reed-Muller
codes and is based on the $2 \times 2$ matrix $\bigl[ 1 &0 1& 1 \bigr]$. It was
shown by Ar\i kan and Telatar that this construction achieves an error exponent
of $\frac12$, i.e., that for sufficiently large blocklengths the error
probability decays exponentially in the square root of the length. It was
already mentioned by Ar\i kan that in principle larger matrices can be used to
construct polar codes. A fundamental question then is to see whether there
exist matrices with exponent exceeding $\frac12$. We first show that any $\ell
\times \ell$ matrix none of whose column permutations is upper triangular
polarizes symmetric channels. We then characterize the exponent of a given
square matrix and derive upper and lower bounds on achievable exponents. Using
these bounds we show that there are no matrices of size less than 15 with
exponents exceeding $\frac12$. Further, we give a general construction based on
BCH codes which for large $n$ achieves exponents arbitrarily close to 1 and
which exceeds $\frac12$ for size 16.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 19:39:05 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Jan 2009 18:17:45 GMT"
}
]
| 2009-01-26T00:00:00 | [
[
"Korada",
"Satish Babu",
""
],
[
"Sasoglu",
"Eren",
""
],
[
"Urbanke",
"Rudiger",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0541 | Yi Ming Zou | Leslie Ying and Yi Ming Zou | Linear Transformations and Restricted Isometry Property | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Restricted Isometry Property (RIP) introduced by Cand\'es and Tao is a
fundamental property in compressed sensing theory. It says that if a sampling
matrix satisfies the RIP of certain order proportional to the sparsity of the
signal, then the original signal can be reconstructed even if the sampling
matrix provides a sample vector which is much smaller in size than the original
signal. This short note addresses the problem of how a linear transformation
will affect the RIP. This problem arises from the consideration of extending
the sensing matrix and the use of compressed sensing in different bases. As an
application, the result is applied to the redundant dictionary setting in
compressed sensing.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 20:34:35 GMT"
}
]
| 2009-01-06T00:00:00 | [
[
"Ying",
"Leslie",
""
],
[
"Zou",
"Yi Ming",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0573 | Virgilio Rodriguez | Virgilio Rodriguez and Rudolf Mathar and Anke Schmeink | Asymptotic stability and capacity results for a broad family of power
adjustment rules: Expanded discussion | 9 pages; 3 figures | null | null | null | cs.IT math.FA math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In any wireless communication environment in which a transmitter creates
interference to the others, a system of non-linear equations arises. Its form
(for 2 terminals) is p1=g1(p2;a1) and p2=g2(p1;a2), with p1, p2 power levels;
a1, a2 quality-of-service (QoS) targets; and g1, g2 functions akin to
"interference functions" in Yates (JSAC, 13(7):1341-1348, 1995). Two
fundamental questions are: (1) does the system have a solution?; and if so, (2)
what is it?. (Yates, 1995) shows that IF the system has a solution, AND the
"interference functions" satisfy some simple properties, a "greedy" power
adjustment process will always converge to a solution. We show that, if the
power-adjustment functions have similar properties to those of (Yates, 1995),
and satisfy a condition of the simple form gi(1,1,...,1)<1, then the system has
a unique solution that can be found iteratively. As examples, feasibility
conditions for macro-diversity and multiple-connection receptions are given.
Informally speaking, we complement (Yates, 1995) by adding the feasibility
condition it lacked. Our analysis is based on norm concepts, and the Banach's
contraction-mapping principle.
| [
{
"version": "v1",
"created": "Mon, 5 Jan 2009 22:26:53 GMT"
}
]
| 2009-01-07T00:00:00 | [
[
"Rodriguez",
"Virgilio",
""
],
[
"Mathar",
"Rudolf",
""
],
[
"Schmeink",
"Anke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0585 | R. Dean Malmgren | R. Dean Malmgren, Daniel B. Stouffer, Adilson E. Motter, Luis A.N.
Amaral | A Poissonian explanation for heavy-tails in e-mail communication | 9 pages, 5 figures | PNAS 105(47): 18153-18158 (2008) | 10.1073/pnas.0800332105 | null | physics.soc-ph cs.CY physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Patterns of deliberate human activity and behavior are of utmost importance
in areas as diverse as disease spread, resource allocation, and emergency
response. Because of its widespread availability and use, e-mail correspondence
provides an attractive proxy for studying human activity. Recently, it was
reported that the probability density for the inter-event time $\tau$ between
consecutively sent e-mails decays asymptotically as $\tau^{-\alpha}$, with
$\alpha \approx 1$. The slower than exponential decay of the inter-event time
distribution suggests that deliberate human activity is inherently
non-Poissonian. Here, we demonstrate that the approximate power-law scaling of
the inter-event time distribution is a consequence of circadian and weekly
cycles of human activity. We propose a cascading non-homogeneous Poisson
process which explicitly integrates these periodic patterns in activity with an
individual's tendency to continue participating in an activity. Using standard
statistical techniques, we show that our model is consistent with the empirical
data. Our findings may also provide insight into the origins of heavy-tailed
distributions in other complex systems.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 01:19:12 GMT"
}
]
| 2009-01-08T00:00:00 | [
[
"Malmgren",
"R. Dean",
""
],
[
"Stouffer",
"Daniel B.",
""
],
[
"Motter",
"Adilson E.",
""
],
[
"Amaral",
"Luis A. N.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0901.0595 | Chandra Nair | Chandra Nair | Capacity regions of two new classes of 2-receiver broadcast channels | 10 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by a simple broadcast channel, we generalize the notions of a less
noisy receiver and a more capable receiver to an essentially less noisy
receiver and an essentially more capable receiver respectively. We establish
the capacity regions of these classes by borrowing on existing techniques to
obtain the characterization of the capacity region for certain new and
interesting classes of broadcast channels. We also establish the relationships
between the new classes and the existing classes.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 06:37:12 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 00:50:23 GMT"
}
]
| 2009-04-29T00:00:00 | [
[
"Nair",
"Chandra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0597 | Reza Rastegar | Reza Rastegar | On the Optimal Convergence Probability of Univariate Estimation of
Distribution Algorithms | evolutionary computation | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we obtain bounds on the probability of convergence to the
optimal solution for the compact Genetic Algorithm (cGA) and the Population
Based Incremental Learning (PBIL). We also give a sufficient condition for
convergence of these algorithms to the optimal solution and compute a range of
possible values of the parameters of these algorithms for which they converge
to the optimal solution with a confidence level.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 06:36:54 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Jul 2009 18:27:38 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Oct 2009 13:34:45 GMT"
},
{
"version": "v4",
"created": "Mon, 13 Sep 2010 12:40:44 GMT"
}
]
| 2010-09-14T00:00:00 | [
[
"Rastegar",
"Reza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.0598 | Reza Rastegar | Reza Rastegar, Arash Hariri | A Step Forward in Studying the Compact Genetic Algorithm | 13 Pages | Evolutionary Computation (2006),Vol 14, No 3, 277-290 | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The compact Genetic Algorithm (cGA) is an Estimation of Distribution
Algorithm that generates offspring population according to the estimated
probabilistic model of the parent population instead of using traditional
recombination and mutation operators. The cGA only needs a small amount of
memory; therefore, it may be quite useful in memory-constrained applications.
This paper introduces a theoretical framework for studying the cGA from the
convergence point of view in which, we model the cGA by a Markov process and
approximate its behavior using an Ordinary Differential Equation (ODE). Then,
we prove that the corresponding ODE converges to local optima and stays there.
Consequently, we conclude that the cGA will converge to the local optima of the
function to be optimized.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 07:07:00 GMT"
}
]
| 2009-01-07T00:00:00 | [
[
"Rastegar",
"Reza",
""
],
[
"Hariri",
"Arash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.0608 | Te Sun Han | Te Sun Han | Multicasting correlated multi-source to multi-sink over a network | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of network coding with multicast of a single source to multisink
has first been studied by Ahlswede, Cai, Li and Yeung in 2000, in which they
have established the celebrated max-flow mini-cut theorem on non-physical
information flow over a network of independent channels. On the other hand, in
1980, Han has studied the case with correlated multisource and a single sink
from the viewpoint of polymatroidal functions in which a necessary and
sufficient condition has been demonstrated for reliable transmission over the
network. This paper presents an attempt to unify both cases, which leads to
establish a necessary and sufficient condition for reliable transmission over a
network multicasting correlated multisource to multisink. Here, the problem of
separation of source coding and channel coding is also discussed.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 08:37:04 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Jan 2009 09:07:21 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Feb 2009 12:00:47 GMT"
},
{
"version": "v4",
"created": "Mon, 9 Mar 2009 14:30:52 GMT"
},
{
"version": "v5",
"created": "Sun, 26 Apr 2009 17:11:31 GMT"
},
{
"version": "v6",
"created": "Wed, 18 Nov 2009 04:43:20 GMT"
},
{
"version": "v7",
"created": "Fri, 29 Jan 2010 09:21:47 GMT"
}
]
| 2010-01-29T00:00:00 | [
[
"Han",
"Te Sun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0633 | Vicen\c{c} G\'omez Cerd\`a | B. Kappen, V. Gomez, M. Opper | Optimal control as a graphical model inference problem | 26 pages, 12 Figures; Machine Learning Journal (2012) | null | 10.1007/s10994-012-5278-7 | null | math.OC cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We reformulate a class of non-linear stochastic optimal control problems
introduced by Todorov (2007) as a Kullback-Leibler (KL) minimization problem.
As a result, the optimal control computation reduces to an inference
computation and approximate inference methods can be applied to efficiently
compute approximate optimal controls. We show how this KL control theory
contains the path integral control method as a special case. We provide an
example of a block stacking task and a multi-agent cooperative game where we
demonstrate how approximate inference can be successfully applied to instances
that are too complex for exact computation. We discuss the relation of the KL
control approach to other inference approaches to control.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 11:54:29 GMT"
},
{
"version": "v2",
"created": "Wed, 7 Jan 2009 08:17:04 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Jan 2012 15:26:08 GMT"
}
]
| 2012-01-19T00:00:00 | [
[
"Kappen",
"B.",
""
],
[
"Gomez",
"V.",
""
],
[
"Opper",
"M.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
]
|
0901.0643 | Yucel Altug | Yucel Altug, S. Serdar Kozat, M. Kivanc Mihcak | An Information Theoretic Analysis of Single Transceiver Passive RFID
Networks | 15 pages, 2 figures, submitted to IEEE Trans. Information Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study single transceiver passive RFID networks by modeling
the underlying physical system as a special cascade of a certain broadcast
channel (BCC) and a multiple access channel (MAC), using a "nested codebook"
structure in between. The particular application differentiates this
communication setup from an ordinary cascade of a BCC and a MAC, and requires
certain structures such as "nested codebooks", impurity channels or additional
power constraints. We investigate this problem both for discrete alphabets,
where we characterize the achievable rate region, as well as for continuous
alphabets with additive Gaussian noise, where we provide the capacity region.
Hence, we establish the maximal achievable error free communication rates for
this particular problem which constitutes the fundamental limit that is
achievable by any TDMA based RFID protocol and the achievable rate region for
any RFID protocol for the case of continuous alphabets under additive Gaussian
noise.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 13:12:10 GMT"
}
]
| 2009-01-07T00:00:00 | [
[
"Altug",
"Yucel",
""
],
[
"Kozat",
"S. Serdar",
""
],
[
"Mihcak",
"M. Kivanc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0702 | Eitan Yaakobi | Eitan Yaakobi, Alexander Vardy, Paul H. Siegel, and Jack K. Wolf | Multidimensional Flash Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Flash memory is a non-volatile computer memory comprised of blocks of cells,
wherein each cell can take on q different levels corresponding to the number of
electrons it contains. Increasing the cell level is easy; however, reducing a
cell level forces all the other cells in the same block to be erased. This
erasing operation is undesirable and therefore has to be used as infrequently
as possible. We consider the problem of designing codes for this purpose, where
k bits are stored using a block of n cells with q levels each. The goal is to
maximize the number of bit writes before an erase operation is required. We
present an efficient construction of codes that can store an arbitrary number
of bits. Our construction can be viewed as an extension to multiple dimensions
of the earlier work of Jiang and Bruck, where single-dimensional codes that can
store only 2 bits were proposed.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 20:39:03 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Feb 2009 04:58:45 GMT"
},
{
"version": "v3",
"created": "Fri, 3 Apr 2009 23:01:49 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Yaakobi",
"Eitan",
""
],
[
"Vardy",
"Alexander",
""
],
[
"Siegel",
"Paul H.",
""
],
[
"Wolf",
"Jack K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0733 | \'Eric Martin | \'Eric A. Martin | Contextual hypotheses and semantics of logic programs | To appear in Theory and Practice of Logic Programming (TPLP) 46
pages, 3 figures | null | null | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Logic programming has developed as a rich field, built over a logical
substratum whose main constituent is a nonclassical form of negation, sometimes
coexisting with classical negation. The field has seen the advent of a number
of alternative semantics, with Kripke-Kleene semantics, the well-founded
semantics, the stable model semantics, and the answer-set semantics standing
out as the most successful. We show that all aforementioned semantics are
particular cases of a generic semantics, in a framework where classical
negation is the unique form of negation and where the literals in the bodies of
the rules can be `marked' to indicate that they can be the targets of
hypotheses. A particular semantics then amounts to choosing a particular
marking scheme and choosing a particular set of hypotheses. When a literal
belongs to the chosen set of hypotheses, all marked occurrences of that literal
in the body of a rule are assumed to be true, whereas the occurrences of that
literal that have not been marked in the body of the rule are to be derived in
order to contribute to the firing of the rule. Hence the notion of hypothetical
reasoning that is presented in this framework is not based on making global
assumptions, but more subtly on making local, contextual assumptions, taking
effect as indicated by the chosen marking scheme on the basis of the chosen set
of hypotheses. Our approach offers a unified view on the various semantics
proposed in logic programming, classical in that only classical negation is
used, and links the semantics of logic programs to mechanisms that endow
rule-based systems with the power to harness hypothetical reasoning.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 22:50:22 GMT"
},
{
"version": "v2",
"created": "Fri, 6 May 2011 05:27:50 GMT"
}
]
| 2011-05-09T00:00:00 | [
[
"Martin",
"Éric A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.0734 | Behtash Babadi | Behtash Babadi, Nicholas Kalouptsidis and Vahid Tarokh | SPARLS: A Low Complexity Recursive $\mathcal{L}_1$-Regularized Least
Squares Algorithm | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a Recursive $\mathcal{L}_1$-Regularized Least Squares (SPARLS)
algorithm for the estimation of a sparse tap-weight vector in the adaptive
filtering setting. The SPARLS algorithm exploits noisy observations of the
tap-weight vector output stream and produces its estimate using an
Expectation-Maximization type algorithm. Simulation studies in the context of
channel estimation, employing multi-path wireless channels, show that the
SPARLS algorithm has significant improvement over the conventional widely-used
Recursive Least Squares (RLS) algorithm, in terms of both mean squared error
(MSE) and computational complexity.
| [
{
"version": "v1",
"created": "Tue, 6 Jan 2009 23:03:14 GMT"
}
]
| 2009-01-08T00:00:00 | [
[
"Babadi",
"Behtash",
""
],
[
"Kalouptsidis",
"Nicholas",
""
],
[
"Tarokh",
"Vahid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0749 | Wei Dai | Wei Dai, Hoa Vinh Pham, and Olgica Milenkovic | Quantized Compressive Sensing | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the average distortion introduced by scalar, vector, and entropy
coded quantization of compressive sensing (CS) measurements. The asymptotic
behavior of the underlying quantization schemes is either quantified exactly or
characterized via bounds. We adapt two benchmark CS reconstruction algorithms
to accommodate quantization errors, and empirically demonstrate that these
methods significantly reduce the reconstruction distortion when compared to
standard CS techniques.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 03:15:30 GMT"
},
{
"version": "v2",
"created": "Sat, 7 Mar 2009 19:23:58 GMT"
}
]
| 2009-03-07T00:00:00 | [
[
"Dai",
"Wei",
""
],
[
"Pham",
"Hoa Vinh",
""
],
[
"Milenkovic",
"Olgica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0753 | Sung-eok Jeon | Sung-eok Jeon and Chuanyi Ji | Distributed Preemption Decisions: Probabilistic Graphical Model,
Algorithm and Near-Optimality | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cooperative decision making is a vision of future network management and
control. Distributed connection preemption is an important example where nodes
can make intelligent decisions on allocating resources and controlling traffic
flows for multi-class service networks. A challenge is that nodal decisions are
spatially dependent as traffic flows trespass multiple nodes in a network.
Hence the performance-complexity trade-off becomes important, i.e., how
accurate decisions are versus how much information is exchanged among nodes.
Connection preemption is known to be NP-complete. Centralized preemption is
optimal but computationally intractable. Decentralized preemption is
computationally efficient but may result in a poor performance. This work
investigates distributed preemption where nodes decide whether and which flows
to preempt using only local information exchange with neighbors. We develop,
based on the probabilistic graphical models, a near-optimal distributed
algorithm. The algorithm is used by each node to make collectively near-optimal
preemption decisions. We study trade-offs between near-optimal performance and
complexity that corresponds to the amount of information-exchange of the
distributed algorithm. The algorithm is validated by both analysis and
simulation.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 04:36:58 GMT"
}
]
| 2009-01-08T00:00:00 | [
[
"Jeon",
"Sung-eok",
""
],
[
"Ji",
"Chuanyi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0901.0760 | Marco Duarte | Mark A. Davenport, Chinmay Hegde, Marco F. Duarte, and Richard G.
Baraniuk | A Theoretical Analysis of Joint Manifolds | 24 pages, 4 figures. Corrected typo on grant number in
acknowledgements, page 1 | null | null | TREE0901, Department of Electrical and Computer Engineering, Rice
University | cs.LG cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The emergence of low-cost sensor architectures for diverse modalities has
made it possible to deploy sensor arrays that capture a single event from a
large number of vantage points and using multiple modalities. In many
scenarios, these sensors acquire very high-dimensional data such as audio
signals, images, and video. To cope with such high-dimensional data, we
typically rely on low-dimensional models. Manifold models provide a
particularly powerful model that captures the structure of high-dimensional
data when it is governed by a low-dimensional set of parameters. However, these
models do not typically take into account dependencies among multiple sensors.
We thus propose a new joint manifold framework for data ensembles that exploits
such dependencies. We show that simple algorithms can exploit the joint
manifold structure to improve their performance on standard signal processing
applications. Additionally, recent results concerning dimensionality reduction
for manifolds enable us to formulate a network-scalable data compression scheme
that uses random projections of the sensed data. This scheme efficiently fuses
the data from all sensors through the addition of such projections, regardless
of the data modalities and dimensions.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 06:47:47 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Dec 2009 07:18:30 GMT"
}
]
| 2009-12-09T00:00:00 | [
[
"Davenport",
"Mark A.",
""
],
[
"Hegde",
"Chinmay",
""
],
[
"Duarte",
"Marco F.",
""
],
[
"Baraniuk",
"Richard G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0901.0763 | Shaolei Ren | Shaolei Ren and Mihaela van der Schaar | Distributed Power Allocation in Multi-User Multi-Channel Relay Networks | This paper has been withdrawn by the authors | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the authors as they feel it inappropriate to
publish this paper for the time being.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 07:04:43 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jan 2009 20:39:34 GMT"
},
{
"version": "v3",
"created": "Tue, 31 Aug 2010 06:48:50 GMT"
}
]
| 2010-09-01T00:00:00 | [
[
"Ren",
"Shaolei",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0786 | Vicen\c{c} G\'omez Cerd\`a | V. G\'omez, H. J. Kappen, M. Chertkov | Approximate inference on planar graphs using Loop Calculus and Belief
Propagation | 23 pages, 10 figures. Submitted to Journal of Machine Learning
Research. Proceedings version accepted for UAI 2009 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce novel results for approximate inference on planar graphical
models using the loop calculus framework. The loop calculus (Chertkov and
Chernyak, 2006) allows to express the exact partition function of a graphical
model as a finite sum of terms that can be evaluated once the belief
propagation (BP) solution is known. In general, full summation over all
correction terms is intractable. We develop an algorithm for the approach
presented in (Certkov et al., 2008) which represents an efficient truncation
scheme on planar graphs and a new representation of the series in terms of
Pfaffians of matrices. We analyze the performance of the algorithm for the
partition function approximation for models with binary variables and pairwise
interactions on grids and other planar graphs. We study in detail both the loop
series and the equivalent Pfaffian series and show that the first term of the
Pfaffian series for the general, intractable planar model, can provide very
accurate approximations. The algorithm outperforms previous truncation schemes
of the loop series and is competitive with other state-of-the-art methods for
approximate inference.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 09:21:47 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Feb 2009 14:42:14 GMT"
},
{
"version": "v3",
"created": "Mon, 25 May 2009 14:29:00 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Gómez",
"V.",
""
],
[
"Kappen",
"H. J.",
""
],
[
"Chertkov",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.0824 | Micha{\l} Kaliszan | S{\l}awomir Sta\'nczak and Micha{\l} Kaliszan and Nicholas Bambos and
Marcin Wiczanowski | A Characterization of Max-Min SIR-Balanced Power Allocation with
Applications | 21 pages (onecolumn), 2 figures; changed (extended) content | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a power-controlled wireless network with an established network
topology in which the communication links (transmitter-receiver pairs) are
corrupted by the co-channel interference and background noise. We have fairly
general power constraints since the vector of transmit powers is confined to
belong to an arbitrary convex polytope. The interference is completely
determined by a so-called gain matrix. Assuming irreducibility of this gain
matrix, we provide an elegant characterization of the max-min SIR-balanced
power allocation under such general power constraints. This characterization
gives rise to two types of algorithms for computing the max-min SIR-balanced
power allocation. One of the algorithms is a utility-based power control
algorithm to maximize a weighted sum of the utilities of the link SIRs. Our
results show how to choose the weight vector and utility function so that the
utility-based solution is equal to the solution of the max-min SIR-balancing
problem. The algorithm is not amenable to distributed implementation as the
weights are global variables. In order to mitigate the problem of computing the
weight vector in distributed wireless networks, we point out a saddle point
characterization of the Perron root of some extended gain matrices and discuss
how this characterization can be used in the design of algorithms in which each
link iteratively updates its weight vector in parallel to the power control
recursion. Finally, the paper provides a basis for the development of
distributed power control and beamforming algorithms to find a global solution
of the max-min SIR-balancing problem.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 16:23:04 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jul 2009 13:07:11 GMT"
}
]
| 2009-07-21T00:00:00 | [
[
"Stańczak",
"Sławomir",
""
],
[
"Kaliszan",
"Michał",
""
],
[
"Bambos",
"Nicholas",
""
],
[
"Wiczanowski",
"Marcin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0825 | Damien Chablat | Liang Ma (IRCCyN), Damien Chablat (IRCCyN), Fouad Bennis (IRCCyN), Wei
Zhang (DIE), Fran\c{c}ois Guillaume (EADS) | A new muscle fatigue and recovery model and its ergonomics application
in human simulation | IDMME - Virtual Concept, Beijing : Chine (2008) | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although automatic techniques have been employed in manufacturing industries
to increase productivity and efficiency, there are still lots of manual
handling jobs, especially for assembly and maintenance jobs. In these jobs,
musculoskeletal disorders (MSDs) are one of the major health problems due to
overload and cumulative physical fatigue. With combination of conventional
posture analysis techniques, digital human modelling and simulation (DHM)
techniques have been developed and commercialized to evaluate the potential
physical exposures. However, those ergonomics analysis tools are mainly based
on posture analysis techniques, and until now there is still no fatigue index
available in the commercial software to evaluate the physical fatigue easily
and quickly. In this paper, a new muscle fatigue and recovery model is proposed
and extended to evaluate joint fatigue level in manual handling jobs. A special
application case is described and analyzed by digital human simulation
technique.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 13:39:33 GMT"
}
]
| 2009-01-08T00:00:00 | [
[
"Ma",
"Liang",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Zhang",
"Wei",
"",
"DIE"
],
[
"Guillaume",
"François",
"",
"EADS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0901.0834 | Ligong Wang | Ligong Wang, Roger Colbeck and Renato Renner | Simple Channel Coding Bounds | Presented at ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | New channel coding converse and achievability bounds are derived for a single
use of an arbitrary channel. Both bounds are expressed using a quantity called
the "smooth 0-divergence", which is a generalization of Renyi's divergence of
order 0. The bounds are also studied in the limit of large block-lengths. In
particular, they combine to give a general capacity formula which is equivalent
to the one derived by Verdu and Han.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 15:41:41 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 08:52:33 GMT"
},
{
"version": "v3",
"created": "Wed, 28 Jul 2010 08:14:58 GMT"
}
]
| 2010-07-29T00:00:00 | [
[
"Wang",
"Ligong",
""
],
[
"Colbeck",
"Roger",
""
],
[
"Renner",
"Renato",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.0858 | Vadim E. Levit | Vadim E. Levit and David Tankus | Weighted Well-Covered Graphs without Cycles of Length 4, 5, 6 and 7 | 10 pages | null | null | null | cs.DM cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A graph is well-covered if every maximal independent set has the same
cardinality. The recognition problem of well-covered graphs is known to be
co-NP-complete. Let w be a weight function defined on the vertices of G. Then G
is w-well-covered if all maximal independent sets of G are of the same weight.
The set of weight functions w for which a graph is w-well-covered is a vector
space. We prove that finding the vector space of weight functions under which
an input graph is w-well-covered can be done in polynomial time, if the input
graph does not contain cycles of length 4, 5, 6 and 7.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 16:09:49 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Aug 2009 12:46:08 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Aug 2009 13:34:05 GMT"
},
{
"version": "v4",
"created": "Thu, 16 Sep 2010 14:44:12 GMT"
}
]
| 2010-09-17T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Tankus",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0901.0869 | Irene Durand | Ir\`ene Durand (LaBRI), Aart Middeldorp | On the Complexity of Deciding Call-by-Need | null | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a recent paper we introduced a new framework for the study of call by need
computations to normal form and root-stable form in term rewriting. Using
elementary tree automata techniques and ground tree transducers we obtained
simple decidability proofs for classes of rewrite systems that are much larger
than earlier classes defined using the complicated sequentiality concept. In
this paper we show that we can do without ground tree transducers in order to
arrive at decidability proofs that are phrased in direct tree automata
constructions. This allows us to derive better complexity bounds.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 20:17:25 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Nov 2011 10:12:42 GMT"
}
]
| 2011-11-29T00:00:00 | [
[
"Durand",
"Irène",
"",
"LaBRI"
],
[
"Middeldorp",
"Aart",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0901.0886 | Philippe Canal | R. Brun (CERN), P. Canal (Fermilab), M. Frank (CERN), A. Kreshuk
(CERN), S. Linev (Darmstadt, GSI), P. Russo (Fermilab), F. Rademakers (CERN) | Developments in ROOT I/O and trees | null | J.Phys.Conf.Ser.119:042006,2008 | 10.1088/1742-6596/119/4/042006 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the last several months the main focus of development in the ROOT I/O
package has been code consolidation and performance improvements. Access to
remote files is affected both by bandwidth and latency. We introduced a
pre-fetch mechanism to minimize the number of transactions between client and
server and hence reducing the effect of latency. We will review the
implementation and how well it works in different conditions (gain of an order
of magnitude for remote file access). We will also review new utilities,
including a faster implementation of TTree cloning (gain of an order of
magnitude), a generic mechanism for object references, and a new entry list
mechanism tuned both for small and large number of selections. In addition to
reducing the coupling with the core module and becoming its owns library
(libRIO) (as part of the general restructuration of the ROOT libraries), the
I/O package has been enhanced in the area of XML and SQL support, thread
safety, schema evolution, TTreeFormula, and many other areas. We will also
discuss various ways, ROOT will be able to benefit from multi-core architecture
to improve I/O performances.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 18:00:34 GMT"
}
]
| 2009-01-08T00:00:00 | [
[
"Brun",
"R.",
"",
"CERN"
],
[
"Canal",
"P.",
"",
"Fermilab"
],
[
"Frank",
"M.",
"",
"CERN"
],
[
"Kreshuk",
"A.",
"",
"CERN"
],
[
"Linev",
"S.",
"",
"Darmstadt, GSI"
],
[
"Russo",
"P.",
"",
"Fermilab"
],
[
"Rademakers",
"F.",
"",
"CERN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0901.0911 | Jean-Guillaume Dumas | Alexandre Berzati (LETI, PRISM), C\'ecile Canovas (LETI),
Jean-Guillaume Dumas (LJK), Louis Goubin (PRISM) | Fault Attacks on RSA Public Keys: Left-To-Right Implementations are also
Vulnerable | null | RSA Conference 2009, Cryptographers' Track, San Francisco : United
States (2009) | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | After attacking the RSA by injecting fault and corresponding countermeasures,
works appear now about the need for protecting RSA public elements against
fault attacks. We provide here an extension of a recent attack based on the
public modulus corruption. The difficulty to decompose the "Left-To-Right"
exponentiation into partial multiplications is overcome by modifying the public
modulus to a number with known factorization. This fault model is justified
here by a complete study of faulty prime numbers with a fixed size. The good
success rate of this attack combined with its practicability raises the
question of using faults for changing algebraic properties of finite field
based cryptosystems.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 20:15:58 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jan 2009 07:33:45 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Jan 2011 17:41:13 GMT"
}
]
| 2011-02-01T00:00:00 | [
[
"Berzati",
"Alexandre",
"",
"LETI, PRISM"
],
[
"Canovas",
"Cécile",
"",
"LETI"
],
[
"Dumas",
"Jean-Guillaume",
"",
"LJK"
],
[
"Goubin",
"Louis",
"",
"PRISM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.0930 | Jan Tusch | Marc M\"orig, Dieter Rautenbach, Michiel Smid, Jan Tusch | An \Omega(n log n) lower bound for computing the sum of even-ranked
elements | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a sequence A of 2n real numbers, the Even-Rank-Sum problem asks for the
sum of the n values that are at the even positions in the sorted order of the
elements in A. We prove that, in the algebraic computation-tree model, this
problem has time complexity \Theta(n log n). This solves an open problem posed
by Michael Shamos at the Canadian Conference on Computational Geometry in 2008.
| [
{
"version": "v1",
"created": "Wed, 7 Jan 2009 21:55:59 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2009 09:53:31 GMT"
}
]
| 2009-03-23T00:00:00 | [
[
"Mörig",
"Marc",
""
],
[
"Rautenbach",
"Dieter",
""
],
[
"Smid",
"Michiel",
""
],
[
"Tusch",
"Jan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.0948 | Ali Nazari | Ali Nazari, Achilleas Anastasopoulos and S. Sandeep Pradhan | A New Universal Random-Coding Bound for Average Probability Error
Exponent for Multiple-Access Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, a new upper bound for average error probability of a two-user
discrete memoryless (DM) multiple-access channel (MAC) is derived. This bound
can be universally obtained for all discrete memoryless MACs with given input
and output alphabets. This is the first bound of this type that explicitly uses
the method of expurgation. It is shown that the exponent of this bound is
greater than or equal to those of previously known bounds.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 05:28:56 GMT"
}
]
| 2009-01-09T00:00:00 | [
[
"Nazari",
"Ali",
""
],
[
"Anastasopoulos",
"Achilleas",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1043 | Marcelo Muniz Silva Alves | Marcelo Muniz S. Alves and Luciano Panek | The Symmetries of the $\pi$-metric | null | null | null | null | cs.IT cs.DM math.CO math.IT math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let V be an n-dimensional vector space over a finite field F_q. We consider
on V the $\pi$-metric recently introduced by K. Feng, L. Xu and F. J.
Hickernell. In this short note we give a complete description of the group of
symmetries of V under the $\pi$-metric.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 13:47:57 GMT"
}
]
| 2009-01-09T00:00:00 | [
[
"Alves",
"Marcelo Muniz S.",
""
],
[
"Panek",
"Luciano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
]
|
0901.1062 | Julien Bringer | Julien Bringer, Herve Chabanne and Bruno Kindarji | Identification with Encrypted Biometric Data | An extended abstract -- entitled "Error-Tolerant Searchable
Encryption" -- of this work has been accepted to and will be presented at the
Communication and Information Systems Security Symposium, International
Conference on Communications (ICC) 2009, June 14-18, Germany. This paper is
the full version. Submitted for publication | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Biometrics make human identification possible with a sample of a biometric
trait and an associated database. Classical identification techniques lead to
privacy concerns. This paper introduces a new method to identify someone using
his biometrics in an encrypted way. Our construction combines Bloom Filters
with Storage and Locality-Sensitive Hashing. We apply this error-tolerant
scheme, in a Hamming space, to achieve biometric identification in an efficient
way. This is the first non-trivial identification scheme dealing with fuzziness
and encrypted data.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 14:41:47 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Sep 2009 08:25:59 GMT"
}
]
| 2009-09-07T00:00:00 | [
[
"Bringer",
"Julien",
""
],
[
"Chabanne",
"Herve",
""
],
[
"Kindarji",
"Bruno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.1084 | Ramon Van Handel | Ramon van Handel | When do nonlinear filters achieve maximal accuracy? | 18 pages | SIAM J. Control Optim. 48, 3151-3168 (2009) | null | null | math.PR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The nonlinear filter for an ergodic signal observed in white noise is said to
achieve maximal accuracy if the stationary filtering error vanishes as the
signal to noise ratio diverges. We give a general characterization of the
maximal accuracy property in terms of various systems theoretic notions. When
the signal state space is a finite set explicit necessary and sufficient
conditions are obtained, while the linear Gaussian case reduces to a classic
result of Kwakernaak and Sivan (1972).
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 16:45:01 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Jul 2009 18:58:01 GMT"
}
]
| 2010-01-28T00:00:00 | [
[
"van Handel",
"Ramon",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1095 | Emiliano De Cristofaro | Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff | FAIR: Fuzzy-based Aggregation providing In-network Resilience for
real-time Wireless Sensor Networks | This paper is an extended version of the paper appeared in the 2nd
Conference on Wireless Network Security (WiSec'09) | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work introduces FAIR, a novel framework for Fuzzy-based Aggregation
providing In-network Resilience for Wireless Sensor Networks. FAIR addresses
the possibility of malicious aggregator nodes manipulating data. It provides
data-integrity based on a trust level of the WSN response and it tolerates link
or node failures. Compared to available solutions, it offers a general
aggregation model and makes the trust level visible to the querier. We classify
the proposed approach as complementary to protocols ensuring resilience against
sensor leaf nodes providing faulty data. Thanks to our flexible resilient
framework and due to the use of Fuzzy Inference Schemes, we achieve promising
results within a short design cycle.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 17:21:46 GMT"
}
]
| 2009-01-09T00:00:00 | [
[
"De Cristofaro",
"Emiliano",
""
],
[
"Bohli",
"Jens-Matthias",
""
],
[
"Westhoff",
"Dirk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.1123 | Reza Rastegar | Arash Hariri, K. Navi, Reza Rastegar | A High Dynamic Range 3-Moduli-Set with Efficient Reverse Converter | null | Computers & Mathematics with Applications (2008), Vol 55, No 4,
660-668 | null | null | cs.AR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | -Residue Number System (RNS) is a valuable tool for fast and parallel
arithmetic. It has a wide application in digital signal processing, fault
tolerant systems, etc. In this work, we introduce the 3-moduli set {2^n,
2^{2n}-1, 2^{2n}+1} and propose its residue to binary converter using the
Chinese Remainder Theorem. We present its simple hardware implementation that
mainly includes one Carry Save Adder (CSA) and a Modular Adder (MA). We compare
the performance and area utilization of our reverse converter to the reverse
converters of the moduli sets {2^n-1, 2^n, 2^n+1, 2^{2n}+1} and {2^n-1, 2^n,
2^n+1, 2^n-2^{(n+1)/2}+1, 2^n+2^{(n+1)/2}+1} that have the same dynamic range
and we demonstrate that our architecture is better in terms of performance and
area utilization. Also, we show that our reverse converter is faster than the
reverse converter of {2^n-1, 2^n, 2^n+1} for dynamic ranges like 8-bit, 16-bit,
32-bit and 64-bit however it requires more area.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 20:14:00 GMT"
}
]
| 2009-01-09T00:00:00 | [
[
"Hariri",
"Arash",
""
],
[
"Navi",
"K.",
""
],
[
"Rastegar",
"Reza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.1140 | Khaled Elbassioni | Khaled Elbassioni, Rajiv Raman, Saurabh Ray, Rene Sitters | On Profit-Maximizing Pricing for the Highway and Tollbooth Problems | null | null | 10.1007/978-3-642-04645-2_25 | null | cs.DS cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the \emph{tollbooth problem}, we are given a tree $\bT=(V,E)$ with $n$
edges, and a set of $m$ customers, each of whom is interested in purchasing a
path on the tree. Each customer has a fixed budget, and the objective is to
price the edges of $\bT$ such that the total revenue made by selling the paths
to the customers that can afford them is maximized. An important special case
of this problem, known as the \emph{highway problem}, is when $\bT$ is
restricted to be a line.
For the tollbooth problem, we present a randomized $O(\log n)$-approximation,
improving on the current best $O(\log m)$-approximation. We also study a
special case of the tollbooth problem, when all the paths that customers are
interested in purchasing go towards a fixed root of $\bT$. In this case, we
present an algorithm that returns a $(1-\epsilon)$-approximation, for any
$\epsilon > 0$, and runs in quasi-polynomial time. On the other hand, we rule
out the existence of an FPTAS by showing that even for the line case, the
problem is strongly NP-hard. Finally, we show that in the \emph{coupon model},
when we allow some items to be priced below zero to improve the overall profit,
the problem becomes even APX-hard.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 21:23:37 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Feb 2009 14:06:17 GMT"
},
{
"version": "v3",
"created": "Wed, 18 Mar 2009 16:35:48 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Elbassioni",
"Khaled",
""
],
[
"Raman",
"Rajiv",
""
],
[
"Ray",
"Saurabh",
""
],
[
"Sitters",
"Rene",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0901.1144 | Arturo Berrones | Arturo Berrones | Bayesian Inference Based on Stationary Fokker-Planck Sampling | Accepted in Neural Computation | null | null | null | cond-mat.dis-nn cs.NE physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel formalism for Bayesian learning in the context of complex inference
models is proposed. The method is based on the use of the Stationary
Fokker--Planck (SFP) approach to sample from the posterior density. Stationary
Fokker--Planck sampling generalizes the Gibbs sampler algorithm for arbitrary
and unknown conditional densities. By the SFP procedure approximate analytical
expressions for the conditionals and marginals of the posterior can be
constructed. At each stage of SFP, the approximate conditionals are used to
define a Gibbs sampling process, which is convergent to the full joint
posterior. By the analytical marginals efficient learning methods in the
context of Artificial Neural Networks are outlined. Off--line and incremental
Bayesian inference and Maximum Likelihood Estimation from the posterior is
performed in classification and regression examples. A comparison of SFP with
other Monte Carlo strategies in the general problem of sampling from arbitrary
densities is also presented. It is shown that SFP is able to jump large
low--probabilty regions without the need of a careful tuning of any step size
parameter. In fact, the SFP method requires only a small set of meaningful
parameters which can be selected following clear, problem--independent
guidelines. The computation cost of SFP, measured in terms of loss function
evaluations, grows linearly with the given model's dimension.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 22:09:02 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 15:40:00 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Oct 2009 01:02:27 GMT"
}
]
| 2009-10-26T00:00:00 | [
[
"Berrones",
"Arturo",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0901.1152 | Victor Eliashberg | Victor Eliashberg | A nonclassical symbolic theory of working memory, mental computations,
and mental set | 29 pages, 7 figures | null | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper tackles four basic questions associated with human brain as a
learning system. How can the brain learn to (1) mentally simulate different
external memory aids, (2) perform, in principle, any mental computations using
imaginary memory aids, (3) recall the real sensory and motor events and
synthesize a combinatorial number of imaginary events, (4) dynamically change
its mental set to match a combinatorial number of contexts? We propose a
uniform answer to (1)-(4) based on the general postulate that the human
neocortex processes symbolic information in a "nonclassical" way. Instead of
manipulating symbols in a read/write memory, as the classical symbolic systems
do, it manipulates the states of dynamical memory representing different
temporary attributes of immovable symbolic structures stored in a long-term
memory. The approach is formalized as the concept of E-machine. Intuitively, an
E-machine is a system that deals mainly with characteristic functions
representing subsets of memory pointers rather than the pointers themselves.
This nonclassical symbolic paradigm is Turing universal, and, unlike the
classical one, is efficiently implementable in homogeneous neural networks with
temporal modulation topologically resembling that of the neocortex.
| [
{
"version": "v1",
"created": "Thu, 8 Jan 2009 23:42:45 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Eliashberg",
"Victor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0901.1155 | Itai Benjamini | Itai Benjamini, Yury Makarychev | Balanced allocation: Memory performance tradeoffs | Published in at http://dx.doi.org/10.1214/11-AAP804 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2012, Vol. 22, No. 4, 1642-1649 | 10.1214/11-AAP804 | IMS-AAP-AAP804 | cs.DS cs.DM math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Suppose we sequentially put $n$ balls into $n$ bins. If we put each ball into
a random bin then the heaviest bin will contain ${\sim}\log n/\log\log n$ balls
with high probability. However, Azar, Broder, Karlin and Upfal [SIAM J. Comput.
29 (1999) 180--200] showed that if each time we choose two bins at random and
put the ball in the least loaded bin among the two, then the heaviest bin will
contain only ${\sim}\log\log n$ balls with high probability. How much memory do
we need to implement this scheme? We need roughly $\log\log\log n$ bits per
bin, and $n\log\log\log n$ bits in total. Let us assume now that we have
limited amount of memory. For each ball, we are given two random bins and we
have to put the ball into one of them. Our goal is to minimize the load of the
heaviest bin. We prove that if we have $n^{1-\delta}$ bits then the heaviest
bin will contain at least $\Omega(\delta\log n/\log\log n)$ balls with high
probability. The bound is tight in the communication complexity model.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 00:23:33 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Sep 2012 07:22:48 GMT"
}
]
| 2012-09-13T00:00:00 | [
[
"Benjamini",
"Itai",
""
],
[
"Makarychev",
"Yury",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0901.1162 | Anand Kumar Narayanan | Ming-Deh Huang and Anand Kumar Narayanan | Folded Algebraic Geometric Codes From Galois Extensions | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new class of list decodable codes based on Galois extensions of
function fields and present a list decoding algorithm. These codes are obtained
as a result of folding the set of rational places of a function field using
certain elements (automorphisms) from the Galois group of the extension. This
work is an extension of Folded Reed Solomon codes to the setting of Algebraic
Geometric codes. We describe two constructions based on this framework
depending on if the order of the automorphism used to fold the code is large or
small compared to the block length. When the automorphism is of large order,
the codes have polynomially bounded list size in the worst case. This
construction gives codes of rate $R$ over an alphabet of size independent of
block length that can correct a fraction of $1-R-\epsilon$ errors subject to
the existence of asymptotically good towers of function fields with large
automorphisms. The second construction addresses the case when the order of the
element used to fold is small compared to the block length. In this case a
heuristic analysis shows that for a random received word, the expected list
size and the running time of the decoding algorithm are bounded by a polynomial
in the block length. When applied to the Garcia-Stichtenoth tower, this yields
codes of rate $R$ over an alphabet of size
$(\frac{1}{\epsilon^2})^{O(\frac{1}{\epsilon})}$, that can correct a fraction
of $1-R-\epsilon$ errors.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 02:46:04 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Huang",
"Ming-Deh",
""
],
[
"Narayanan",
"Anand Kumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1181 | Baris Baykant Alagoz | B. Baykant Alagoz | Fault Masking By Probabilistic Voting | null | OncuBilim Algorithm And Systems Labs. Vol.09, Art.No:01,(2009) | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this study, we introduced a probabilistic voter, regarding symbol
probabilities in decision process besides majority consensus. Conventional
majority voter is independent of functionality of redundant modules. In our
study, proposed probabilistic voter is designed corresponding to functionality
of the redundant module. We tested probabilistic voter for 3 and 5 redundant
modules with random transient errors inserted the wires and it was seen from
simulation results that Multi-Modular Redundancy (M-MR) with Probabilistic
Voting (PV) had been shown better availability performance than conventional
majority voter.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 13:55:57 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jan 2009 15:19:16 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Alagoz",
"B. Baykant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0901.1230 | Leslie De Koninck | Leslie De Koninck | Logical Algorithms meets CHR: A meta-complexity result for Constraint
Handling Rules with rule priorities | To appear in Theory and Practice of Logic Programming (TPLP) | null | null | null | cs.PL cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the relationship between the Logical Algorithms
language (LA) of Ganzinger and McAllester and Constraint Handling Rules (CHR).
We present a translation schema from LA to CHR-rp: CHR with rule priorities,
and show that the meta-complexity theorem for LA can be applied to a subset of
CHR-rp via inverse translation. Inspired by the high-level implementation
proposal for Logical Algorithm by Ganzinger and McAllester and based on a new
scheduling algorithm, we propose an alternative implementation for CHR-rp that
gives strong complexity guarantees and results in a new and accurate
meta-complexity theorem for CHR-rp. It is furthermore shown that the
translation from Logical Algorithms to CHR-rp combined with the new CHR-rp
implementation, satisfies the required complexity for the Logical Algorithms
meta-complexity result to hold.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 12:37:32 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"De Koninck",
"Leslie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0901.1244 | Eric Chen | Eric Z. Chen | Constructions of Quasi-Twisted Two-Weight Codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A code is said to be two-weight if the non-zero codewords have only two
different a weight w1 and w2. Two-weight codes are closely related to strongly
regular graphs. In this paper. It is shown that a consta-cyclic code of
composite length can be put in the quasi-twisted form. Based on this
transformation, a new construction method of quasi-twisted (QT) two-weight
codes is presented. A large amount of QT two-weight codes are found, and some
new codes are also constructed.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 13:31:11 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Chen",
"Eric Z.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1257 | Rainer Luetticke | Rainer Luetticke, Ridvan Cinar | An Internet-based Audience Response System for the Improvement of
Teaching | 2 pages, accepted for presentation at International Conference for
the Learning Sciences - ICLS2008, Utrecht, the Netherlands, June 2008. On
request poster is available | null | null | null | cs.CY cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have developed an Internet-based audience response system (called ARSBO).
In this way we combine the advantages of common audience response systems using
handheld devices and the easy and cheap access to the Internet. Evaluations of
audience response systems in the literature have shown their success:
encouraging participation of the students as well as immediate feedback to
answers to the whole group for evaluational purposes of the teacher. However,
commercial systems are relatively expensive and the number of students in such
a teaching-learning scenario is limited. ARSBO solves these problems. Using the
Internet (e.g. in computer rooms or by wireless Internet access) there are no
special costs and the number of participating students is not limited. ARSBO is
very easy to use for students as well as for the construction of new questions
with possible answers and for the visualization of statistical results to
questions.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 15:08:48 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Luetticke",
"Rainer",
""
],
[
"Cinar",
"Ridvan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.1287 | Dae San Kim | Dae San Kim | Infinite families of recursive formulas generating power moments of
Kloosterman sums: O^- (2n, 2^r) case | null | null | null | null | math.NT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we construct eight infinite families of binary linear codes
associated with double cosets with respect to certain maximal parabolic
subgroup of the special orthogonal group $SO^-(2n,2^r)$. Then we obtain four
infinite families of recursive formulas for the power moments of Kloosterman
sums and four those of 2-dimensional Kloosterman sums in terms of the
frequencies of weights in the codes. This is done via Pless power moment
identity and by utilizing the explicit expressions of exponential sums over
those double cosets related to the evaluations of "Gauss sums" for the
orthogonal groups $O^-(2n,2^r)$
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 17:48:34 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Kim",
"Dae San",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1288 | Vaneet Aggarwal | Vaneet Aggarwal and Ashutosh Sabharwal | Power-Controlled Feedback and Training for Two-way MIMO Channels | in IEEE Transactions on Information Theory, 2010 | IEEE Transactions on Information Theory, vol.56, no.7,
pp.3310,3331, July 2010 | 10.1109/TIT.2010.2048472 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most communication systems use some form of feedback, often related to
channel state information. The common models used in analyses either assume
perfect channel state information at the receiver and/or noiseless state
feedback links. However, in practical systems, neither is the channel estimate
known perfectly at the receiver and nor is the feedback link perfect. In this
paper, we study the achievable diversity multiplexing tradeoff using i.i.d.
Gaussian codebooks, considering the errors in training the receiver and the
errors in the feedback link for FDD systems, where the forward and the feedback
are independent MIMO channels.
Our key result is that the maximum diversity order with one-bit of feedback
information is identical to systems with more feedback bits. Thus,
asymptotically in $\mathsf{SNR}$, more than one bit of feedback does not
improve the system performance at constant rates. Furthermore, the one-bit
diversity-multiplexing performance is identical to the system which has perfect
channel state information at the receiver along with noiseless feedback link.
This achievability uses novel concepts of power controlled feedback and
training, which naturally surface when we consider imperfect channel estimation
and noisy feedback links. In the process of evaluating the proposed training
and feedback protocols, we find an asymptotic expression for the joint
probability of the $\mathsf{SNR}$ exponents of eigenvalues of the actual
channel and the estimated channel which may be of independent interest.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 17:56:37 GMT"
},
{
"version": "v2",
"created": "Tue, 19 May 2009 11:33:36 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Jan 2010 05:13:49 GMT"
}
]
| 2014-07-15T00:00:00 | [
[
"Aggarwal",
"Vaneet",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1289 | Florentin Smarandache | Florentin Smarandache | N-norm and N-conorm in Neutrosophic Logic and Set, and the Neutrosophic
Topologies | 11 pages, 3 diagrams | In author's book A Unifying Field in Logics: Neutrosophic Logic;
Neutrosophic Set, Neutrosophic Probability and Statistics (fourth edition),
2005; Review of the Air Force Academy, No. 1 (14), pp. 05-11, 2009. | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present the N-norms/N-conorms in neutrosophic logic and set
as extensions of T-norms/T-conorms in fuzzy logic and set. Also, as an
extension of the Intuitionistic Fuzzy Topology we present the Neutrosophic
Topologies.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 17:58:39 GMT"
}
]
| 2009-08-17T00:00:00 | [
[
"Smarandache",
"Florentin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0901.1307 | Marc Daumas | Sylvain Collange (ELIAUS), Yoginder Dandass (CSE), Marc Daumas
(ELIAUS), David Defour (ELIAUS) | Using Graphics Processors for Parallelizing Hash-based Data Carving | null | 42nd Hawaii International Conference on System Sciences, Waikoloa
: \'Etats-Unis d'Am\'erique (2009) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ability to detect fragments of deleted image files and to reconstruct
these image files from all available fragments on disk is a key activity in the
field of digital forensics. Although reconstruction of image files from the
file fragments on disk can be accomplished by simply comparing the content of
sectors on disk with the content of known files, this brute-force approach can
be time consuming. This paper presents results from research into the use of
Graphics Processing Units (GPUs) in detecting specific image file byte patterns
in disk clusters. Unique identifying pattern for each disk sector is compared
against patterns in known images. A pattern match indicates the potential
presence of an image and flags the disk sector for further in-depth examination
to confirm the match. The GPU-based implementation outperforms the software
implementation by a significant margin.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 20:15:26 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Collange",
"Sylvain",
"",
"ELIAUS"
],
[
"Dandass",
"Yoginder",
"",
"CSE"
],
[
"Daumas",
"Marc",
"",
"ELIAUS"
],
[
"Defour",
"David",
"",
"ELIAUS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.1312 | Loc Bui | Loc Bui, R. Srikant, Alexander Stolyar | Novel Architectures and Algorithms for Delay Reduction in Back-pressure
Scheduling and Routing | A short version of this paper is accepted to the INFOCOM 2009
Mini-Conference | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The back-pressure algorithm is a well-known throughput-optimal algorithm.
However, its delay performance may be quite poor even when the traffic load is
not close to network capacity due to the following two reasons. First, each
node has to maintain a separate queue for each commodity in the network, and
only one queue is served at a time. Second, the back-pressure routing algorithm
may route some packets along very long routes. In this paper, we present
solutions to address both of the above issues, and hence, improve the delay
performance of the back-pressure algorithm. One of the suggested solutions also
decreases the complexity of the queueing data structures to be maintained at
each node.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 20:41:08 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Jan 2009 21:09:32 GMT"
},
{
"version": "v3",
"created": "Fri, 28 May 2010 18:41:03 GMT"
}
]
| 2010-05-31T00:00:00 | [
[
"Bui",
"Loc",
""
],
[
"Srikant",
"R.",
""
],
[
"Stolyar",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.1315 | Enrique ter Horst A | Abel Rodriguez and Henryk Gzyl and German Molina and Enrique ter Horst | Stochastic Volatility Models Including Open, Close, High and Low Prices | null | null | null | null | q-fin.ST cs.CE cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mounting empirical evidence suggests that the observed extreme prices within
a trading period can provide valuable information about the volatility of the
process within that period. In this paper we define a class of stochastic
volatility models that uses opening and closing prices along with the minimum
and maximum prices within a trading period to infer the dynamics underlying the
volatility process of asset prices and compares it with similar models that
have been previously presented in the literature. The paper also discusses
sequential Monte Carlo algorithms to fit this class of models and illustrates
its features using both a simulation study and data form the SP500 index.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 21:08:29 GMT"
}
]
| 2009-01-12T00:00:00 | [
[
"Rodriguez",
"Abel",
""
],
[
"Gzyl",
"Henryk",
""
],
[
"Molina",
"German",
""
],
[
"ter Horst",
"Enrique",
""
]
]
| [
{
"class": "Quantitative Finance",
"code": "q-fin.ST",
"description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data",
"span": "(Statistical Finance)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0901.1322 | Erik Demaine | Timothy G. Abbott, Erik D. Demaine, and Blaise Gassend | A Generalized Carpenter's Rule Theorem for Self-Touching Linkages | 20 pages, 7 figures | null | null | null | cs.CG cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Carpenter's Rule Theorem states that any chain linkage in the plane can
be folded continuously between any two configurations while preserving the bar
lengths and without the bars crossing. However, this theorem applies only to
strictly simple configurations, where bars intersect only at their common
endpoints. We generalize the theorem to self-touching configurations, where
bars can touch but not properly cross. At the heart of our proof is a new
definition of self-touching configurations of planar linkages, based on an
annotated configuration space and limits of nontouching configurations. We show
that this definition is equivalent to the previously proposed definition of
self-touching configurations, which is based on a combinatorial description of
overlapping features. Using our new definition, we prove the generalized
Carpenter's Rule Theorem using a topological argument. We believe that our
topological methodology provides a powerful tool for manipulating many kinds of
self-touching objects, such as 3D hinged assemblies of polygons and rigid
origami. In particular, we show how to apply our methodology to extend to
self-touching configurations universal reconfigurability results for open
chains with slender polygonal adornments, and single-vertex rigid origami with
convex cones.
| [
{
"version": "v1",
"created": "Fri, 9 Jan 2009 21:25:42 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Abbott",
"Timothy G.",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Gassend",
"Blaise",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0901.1397 | Mathieu Guay-Paquet | Mathieu Guay-Paquet, Jeffrey Shallit | Avoiding Squares and Overlaps Over the Natural Numbers | 16 pages, 2 tables | null | null | null | math.CO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider avoiding squares and overlaps over the natural numbers, using a
greedy algorithm that chooses the least possible integer at each step; the word
generated is lexicographically least among all such infinite words. In the case
of avoiding squares, the word is 01020103..., the familiar ruler function, and
is generated by iterating a uniform morphism. The case of overlaps is more
challenging. We give an explicitly-defined morphism phi : N* -> N* that
generates the lexicographically least infinite overlap-free word by iteration.
Furthermore, we show that for all h,k in N with h <= k, the word phi^{k-h}(h)
is the lexicographically least overlap-free word starting with the letter h and
ending with the letter k, and give some of its symmetry properties.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 17:49:07 GMT"
}
]
| 2009-04-12T00:00:00 | [
[
"Guay-Paquet",
"Mathieu",
""
],
[
"Shallit",
"Jeffrey",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0901.1407 | Bin Yan | Bin Yan, Zheming Lu and Yinjing Guo | Condition for Energy Efficient Watermarking with Random Vector Model
without WSS Assumption | 10 pages, 2 figures, submitted to IEEE Signal Processing Letter for
review | null | null | null | cs.MM cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy efficient watermarking preserves the watermark energy after linear
attack as much as possible. We consider in this letter non-stationary signal
models and derive conditions for energy efficient watermarking under random
vector model without WSS assumption. We find that the covariance matrix of the
energy efficient watermark should be proportional to host covariance matrix to
best resist the optimal linear removal attacks. In WSS process our result
reduces to the well known power spectrum condition. Intuitive geometric
interpretation of the results are also discussed which in turn also provide
more simpler proof of the main results.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 02:25:17 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Yan",
"Bin",
""
],
[
"Lu",
"Zheming",
""
],
[
"Guo",
"Yinjing",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0901.1408 | Yan Zhu | Yan Zhu, Dongning Guo and Michael L. Honig | A Message-Passing Approach for Joint Channel Estimation, Interference
Mitigation and Decoding | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Channel uncertainty and co-channel interference are two major challenges in
the design of wireless systems such as future generation cellular networks.
This paper studies receiver design for a wireless channel model with both
time-varying Rayleigh fading and strong co-channel interference of similar form
as the desired signal. It is assumed that the channel coefficients of the
desired signal can be estimated through the use of pilots, whereas no pilot for
the interference signal is available, as is the case in many practical wireless
systems. Because the interference process is non-Gaussian, treating it as
Gaussian noise generally often leads to unacceptable performance. In order to
exploit the statistics of the interference and correlated fading in time, an
iterative message-passing architecture is proposed for joint channel
estimation, interference mitigation and decoding. Each message takes the form
of a mixture of Gaussian densities where the number of components is limited so
that the overall complexity of the receiver is constant per symbol regardless
of the frame and code lengths. Simulation of both coded and uncoded systems
shows that the receiver performs significantly better than conventional
receivers with linear channel estimation, and is robust with respect to
mismatch in the assumed fading model.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 02:14:37 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Oct 2009 19:06:51 GMT"
}
]
| 2009-10-15T00:00:00 | [
[
"Zhu",
"Yan",
""
],
[
"Guo",
"Dongning",
""
],
[
"Honig",
"Michael L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1413 | Tomas Boothby | Tomas J. Boothby, Robert W. Bradshaw | Bitslicing and the Method of Four Russians Over Larger Finite Fields | null | null | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method of computing with matrices over very small finite fields
of size larger than 2. Specifically, we show how the Method of Four Russians
can be efficiently adapted to these larger fields, and introduce a row-wise
matrix compression scheme that both reduces memory requirements and allows one
to vectorize element operations. We also present timings which confirm the
efficiency of these methods and exceed the speed of the fastest implementations
the authors are aware of.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 04:43:51 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Boothby",
"Tomas J.",
""
],
[
"Bradshaw",
"Robert W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0901.1427 | Sourav Chakraborty | Sourav Chakraborty, Nikhil Devanur | An Online Multi-unit Auction with Improved Competitive Ratio | null | null | null | null | cs.GT cs.CC cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We improve the best known competitive ratio (from 1/4 to 1/2), for the online
multi-unit allocation problem, where the objective is to maximize the
single-price revenue. Moreover, the competitive ratio of our algorithm tends to
1, as the bid-profile tends to ``smoothen''. This algorithm is used as a
subroutine in designing truthful auctions for the same setting: the allocation
has to be done online, while the payments can be decided at the end of the day.
Earlier, a reduction from the auction design problem to the allocation problem
was known only for the unit-demand case. We give a reduction for the general
case when the bidders have decreasing marginal utilities. The problem is
inspired by sponsored search auctions.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 10:00:38 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Chakraborty",
"Sourav",
""
],
[
"Devanur",
"Nikhil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.1444 | Shrinivas Kudekar Mr. | Dinkar Vasudevan and Shrinivas Kudekar | Algebraic gossip on Arbitrary Networks | Paper has been withdrawn due to an error in the main proof | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a network of nodes where each node has a message to communicate to
all other nodes. For this communication problem, we analyze a gossip based
protocol where coded messages are exchanged. This problem was studied by Aoyama
and Shah where a bound to the dissemination time based on the spectral
properties of the underlying communication graph is provided. Our contribution
is a uniform bound that holds for arbitrary networks.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 14:48:46 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Dec 2011 13:22:54 GMT"
}
]
| 2011-12-16T00:00:00 | [
[
"Vasudevan",
"Dinkar",
""
],
[
"Kudekar",
"Shrinivas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1462 | Jerome Jaffre | Guy Chavent (INRIA Rocquencourt, Ceremade) | A Fully Equivalent Global Pressure Formulation for Three-Phase
Compressible Flow | null | null | null | RR-6788 | cs.NA math.AP physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new global pressure formulation for immiscible three-phase
compressible flows in porous media which is fully equivalent to the original
equations, unlike the one introduced in \cite{CJ86}. In this formulation, the
total volumetric flow of the three fluids and the global pressure follow a
classical Darcy law, which simplifies the resolution of the pressure equation.
However, this global pressure formulation exists only for Total Differential
(TD) three-phase data, which depend only on two functions of saturations and
global pressure: the global capillary pressure and the global mobility. Hence
we introduce a class of interpolation which constructs such TD-three-phase data
from any set of three two-phase data (for each pair of fluids) which satisfy a
TD-compatibility condition.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 20:02:58 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Chavent",
"Guy",
"",
"INRIA Rocquencourt, Ceremade"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
]
|
0901.1473 | Yuval Lomnitz | Yuval Lomnitz, Meir Feder | Communication over Individual Channels | Cleanup, Editorial changes, Additional commentary | IEEE Trans. Information Theory, vol. 57, no. 11, pp. 7333 --7358,
Nov. 2011 | 10.1109/TIT.2011.2169130 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of communicating over a channel for which no
mathematical model is specified. We present achievable rates as a function of
the channel input and output known a-posteriori for discrete and continuous
channels, as well as a rate-adaptive scheme employing feedback which achieves
these rates asymptotically without prior knowledge of the channel behavior.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 21:53:41 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Aug 2009 14:29:15 GMT"
}
]
| 2012-02-03T00:00:00 | [
[
"Lomnitz",
"Yuval",
""
],
[
"Feder",
"Meir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1479 | Maciej Kurant | Maciej Kurant | Exploiting the Path Propagation Time Differences in Multipath
Transmission with FEC | 12 pages | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a transmission of a delay-sensitive data stream from a single
source to a single destination. The reliability of this transmission may suffer
from bursty packet losses - the predominant type of failures in today's
Internet. An effective and well studied solution to this problem is to protect
the data by a Forward Error Correction (FEC) code and send the FEC packets over
multiple paths.
In this paper we show that the performance of such a multipath FEC scheme can
often be further improved. Our key observation is that the propagation times on
the available paths often significantly differ, typically by 10-100ms.
We propose to exploit these differences by appropriate packet scheduling that
we call `Spread'. We evaluate our solution with a precise, analytical
formulation and trace-driven simulations. Our studies show that Spread
substantially outperforms the state-of-the-art solutions. It typically achieves
two- to five-fold improvement (reduction) in the effective loss rate. Or
conversely, keeping the same level of effective loss rate, Spread significantly
decreases the observed delays and helps fighting the delay jitter.
| [
{
"version": "v1",
"created": "Sun, 11 Jan 2009 22:26:56 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Kurant",
"Maciej",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.1492 | Chandra Nair | Varun Jog, Chandra Nair | An information inequality for the BSSC channel | A new proof of the inequality is presented. It can be used to close
the gap of the earlier argument; though it is not explained here | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish an information theoretic inequality concerning the binary
skew-symmetric broadcast channel that was conjectured by one of the authors.
This inequality helps to quantify the gap between the sum rate obtained by the
inner bound and outer bound for the binary skew-symmetric broadcast channel.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 01:13:30 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Apr 2009 01:19:01 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Dec 2009 11:44:32 GMT"
}
]
| 2009-12-11T00:00:00 | [
[
"Jog",
"Varun",
""
],
[
"Nair",
"Chandra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1503 | Liang-Liang Xie | Liang-Liang Xie | A Greedy Omnidirectional Relay Scheme | More details added | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A greedy omnidirectional relay scheme is developed, and the corresponding
achievable rate region is obtained for the all-source all-cast problem. The
discussions are first based on the general discrete memoryless channel model,
and then applied to the additive white Gaussian noise (AWGN) models, with both
full-duplex and half-duplex modes.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 04:58:54 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Feb 2009 19:39:55 GMT"
}
]
| 2009-02-17T00:00:00 | [
[
"Xie",
"Liang-Liang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1563 | Bruno Escoffier | Nicolas Bourgeois, Bruno Escoffier, Vangelis Th. Paschos, Johan M.M
van Rooij | Fast Algorithms for Max Independent Set in Graphs of Small Average
Degree | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Max Independent Set (MIS) is a paradigmatic problem in theoretical computer
science and numerous studies tackle its resolution by exact algorithms with
non-trivial worst-case complexity. The best such complexity is, to our
knowledge, the $O^*(1.1889^n)$ algorithm claimed by J.M. Robson (T.R. 1251-01,
LaBRI, Univ. Bordeaux I, 2001) in his unpublished technical report. We also
quote the $O^*(1.2210^n)$ algorithm by Fomin and al. (in Proc. SODA'06, pages
18-25, 2006), that is the best published result about MIS.
In this paper we settle MIS in (connected) graphs with "small" average
degree, more precisely with average degree at most 3, 4, 5 and 6. Dealing with
graphs of average degree at most 3, the best bound known is the recent
$O^*(1.0977^n)$ bound by N. Bourgeois and al. in Proc. IWPEC'08, pages 55-65,
2008). Here we improve this result down to $O^*(1.0854^n)$ by proposing finer
and more powerful reduction rules.
We then propose a generic method showing how improvement of the worst-case
complexity for MIS in graphs of average degree $d$ entails improvement of it in
any graph of average degree greater than $d$ and, based upon it, we tackle MIS
in graphs of average degree 4, 5 and 6.
For MIS in graphs with average degree 4, we provide an upper complexity bound
of $O^*(1.1571^n)$ that outperforms the best known bound of $O^*(1.1713^n)$ by
R. Beigel (Proc. SODA'99, pages 856-857, 1999).
For MIS in graphs of average degree at most 5 and 6, we provide bounds of
$O^*(1.1969^n)$ and $O^*(1.2149^n)$, respectively, that improve upon the
corresponding bounds of $O^*(1.2023^n)$ and $O^*(1.2172^n)$ in graphs of
maximum degree 5 and 6 by (Fomin et al., 2006).
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 12:40:32 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Bourgeois",
"Nicolas",
""
],
[
"Escoffier",
"Bruno",
""
],
[
"Paschos",
"Vangelis Th.",
""
],
[
"van Rooij",
"Johan M. M",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.1582 | Michael Noble S. | Michael S. Noble, Li Ji, Andrew Young, Julia Lee | Parallelizing the XSTAR Photoionization Code | ADASS 2008 (Quebec) proceedings (4 pages, 1 figure) | null | null | null | astro-ph.IM cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe two means by which XSTAR, a code which computes physical
conditions and emission spectra of photoionized gases, has been parallelized.
The first is pvm_xstar, a wrapper which can be used in place of the serial
xstar2xspec script to foster concurrent execution of the XSTAR command line
application on independent sets of parameters. The second is PModel, a plugin
for the Interactive Spectral Interpretation System (ISIS) which allows
arbitrary components of a broad range of astrophysical models to be distributed
across processors during fitting and confidence limits calculations, by
scientists with little training in parallel programming. Plugging the XSTAR
family of analytic models into PModel enables multiple ionization states (e.g.,
of a complex absorber/emitter) to be computed simultaneously, alleviating the
often prohibitive expense of the traditional serial approach. Initial
performance results indicate that these methods substantially enlarge the
problem space to which XSTAR may be applied within practical timeframes.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 14:28:52 GMT"
}
]
| 2009-01-23T00:00:00 | [
[
"Noble",
"Michael S.",
""
],
[
"Ji",
"Li",
""
],
[
"Young",
"Andrew",
""
],
[
"Lee",
"Julia",
""
]
]
| [
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0901.1610 | Janardan Misra | Janardan Misra | Towards a Framework for Observing Artificial Evolutionary Systems | null | null | null | null | cs.NE cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Establishing the emergence of evolutionary behavior as a defining
characteristic of 'life' is a major step in the Artificial life (ALife)
studies. We present here an abstract formal framework for this aim based upon
the notion of high-level observations made on the ALife model at hand during
its simulations. An observation process is defined as a computable
transformation from the underlying dynamic structure of the model universe to a
tuple consisting of abstract components needed to establish the evolutionary
processes in the model. Starting with defining entities and their evolutionary
relationships observed during the simulations of the model, the framework
prescribes a series of definitions, followed by the axioms (conditions) that
must be met in order to establish the level of evolutionary behavior in the
model. The examples of Cellular Automata based Langton Loops and Lambda
calculus based Algorithmic Chemistry are used to illustrate the framework.
Generic design suggestions for the ALife research are also drawn based upon the
framework design and case study analysis.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 16:35:58 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Misra",
"Janardan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0901.1629 | Martin Levesque | Martin Levesque, Halima Elbiaze, Wael Hosny Fouad Aly | Adaptive threshold-based decision for efficient hybrid deflection and
retransmission scheme in OBS networks | 6 pages, conference | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Burst contention is a well-known challenging problem in Optical Burst
Switching (OBS) networks. Deflection routing is used to resolve contention.
Burst retransmission is used to reduce the Burst Loss Ratio (BLR) by
retransmitting dropped bursts. Previous works show that combining deflection
and retransmission outperforms both pure deflection and pure retransmission
approaches. This paper proposes a new Adaptive Hybrid Deflection and
Retransmission (AHDR) approach that dynamically combines deflection and
retransmission approaches based on network conditions such as BLR and link
utilization. Network Simulator 2 (ns-2) is used to simulate the proposed
approach on different network topologies. Simulation results show that the
proposed approach outperforms static approaches in terms of BLR by using an
adaptive decision threshold.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 18:10:48 GMT"
}
]
| 2009-01-13T00:00:00 | [
[
"Levesque",
"Martin",
""
],
[
"Elbiaze",
"Halima",
""
],
[
"Aly",
"Wael Hosny Fouad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0901.1655 | Roberto N\'obrega | Roberto W. Nobrega and Bartolomeu F. Uchoa-Filho | Multishot Codes for Network Coding: Bounds and a Multilevel Construction | 5 pages, 2 figures, submitted to ISIT 2009 | null | 10.1109/ISIT.2009.5205750 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The subspace channel was introduced by Koetter and Kschischang as an adequate
model for the communication channel from the source node to a sink node of a
multicast network that performs random linear network coding. So far, attention
has been given to one-shot subspace codes, that is, codes that use the subspace
channel only once. In contrast, this paper explores the idea of using the
subspace channel more than once and investigates the so called multishot
subspace codes. We present definitions for the problem, a motivating example,
lower and upper bounds for the size of codes, and a multilevel construction of
codes based on block-coded modulation.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 20:23:55 GMT"
}
]
| 2010-07-12T00:00:00 | [
[
"Nobrega",
"Roberto W.",
""
],
[
"Uchoa-Filho",
"Bartolomeu F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1683 | Pedram Pad | Sh. Dashmiz, P. Pad, F. Marvasti | New Bounds for Binary and Ternary Overloaded CDMA | null | null | null | null | cs.IT cs.DM math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study binary and ternary matrices that are used for CDMA
applications that are injective on binary or ternary user vectors. In other
words, in the absence of additive noise, the interference of overloaded CDMA
can be removed completely. Some new algorithms are proposed for constructing
such matrices. Also, using an information theoretic approach, we conjecture the
extent to which such CDMA matrix codes exist. For overloaded case, we also show
that some of the codes derived from our algorithms perform better than the
binary Welch Bound Equality codes; the decoding is ML but of low complexity.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 20:51:43 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jan 2009 10:46:17 GMT"
}
]
| 2009-01-15T00:00:00 | [
[
"Dashmiz",
"Sh.",
""
],
[
"Pad",
"P.",
""
],
[
"Marvasti",
"F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1684 | Riccardo Zecchina | M. Bayati, A. Braunstein, R. Zecchina | A rigorous analysis of the cavity equations for the minimum spanning
tree | 5 pages, 1 figure | J. Math. Phys. 49, 125206 (2008) | 10.1063/1.2982805 | null | cond-mat.stat-mech cond-mat.dis-nn cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze a new general representation for the Minimum Weight Steiner Tree
(MST) problem which translates the topological connectivity constraint into a
set of local conditions which can be analyzed by the so called cavity equations
techniques. For the limit case of the Spanning tree we prove that the fixed
point of the algorithm arising from the cavity equations leads to the global
optimum.
| [
{
"version": "v1",
"created": "Mon, 12 Jan 2009 23:07:59 GMT"
}
]
| 2009-01-14T00:00:00 | [
[
"Bayati",
"M.",
""
],
[
"Braunstein",
"A.",
""
],
[
"Zecchina",
"R.",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.1694 | Ram Somaraju Dr. | Ram Somaraju and Jochen Trumpf | Degrees of Freedom of a Communication Channel: Using Generalised
Singular Values | 16 pages, 2 figures. Submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A fundamental problem in any communication system is: given a communication
channel between a transmitter and a receiver, how many "independent" signals
can be exchanged between them? Arbitrary communication channels that can be
described by linear compact channel operators mapping between normed spaces are
examined in this paper. The (well-known) notions of degrees of freedom at level
$\epsilon$ and essential dimension of such channels are developed in this
general setting. We argue that the degrees of freedom at level $\epsilon$ and
the essential dimension fundamentally limit the number of independent signals
that can be exchanged between the transmitter and the receiver. We also
generalise the concept of singular values of compact operators to be applicable
to compact operators defined on arbitrary normed spaces which do not
necessarily carry a Hilbert space structure. We show how these generalised
singular values can be used to calculate the degrees of freedom at level
$\epsilon$ and the essential dimension of compact operators that describe
communication channels. We describe physically realistic channels that require
such general channel models.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 00:35:49 GMT"
}
]
| 2009-01-14T00:00:00 | [
[
"Somaraju",
"Ram",
""
],
[
"Trumpf",
"Jochen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1695 | Raul Etkin | Raul Etkin and Erik Ordentlich | On the Degrees-of-Freedom of the K-User Gaussian Interference Channel | submitted to IEEE Transactions on Information Theory, June 18, 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The degrees-of-freedom of a K-user Gaussian interference channel (GIFC) has
been defined to be the multiple of (1/2)log_2(P) at which the maximum sum of
achievable rates grows with increasing P. In this paper, we establish that the
degrees-of-freedom of three or more user, real, scalar GIFCs, viewed as a
function of the channel coefficients, is discontinuous at points where all of
the coefficients are non-zero rational numbers. More specifically, for all K>2,
we find a class of K-user GIFCs that is dense in the GIFC parameter space for
which K/2 degrees-of-freedom are exactly achievable, and we show that the
degrees-of-freedom for any GIFC with non-zero rational coefficients is strictly
smaller than K/2. These results are proved using new connections with number
theory and additive combinatorics.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 00:45:21 GMT"
}
]
| 2009-01-14T00:00:00 | [
[
"Etkin",
"Raul",
""
],
[
"Ordentlich",
"Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1696 | Julien Langou | Fred G. Gustavson, Jerzy Wasniewski, Jack J. Dongarra and Julien
Langou | Rectangular Full Packed Format for Cholesky's Algorithm: Factorization,
Solution and Inversion | null | null | null | null | cs.MS cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a new data format for storing triangular, symmetric, and
Hermitian matrices called RFPF (Rectangular Full Packed Format). The standard
two dimensional arrays of Fortran and C (also known as full format) that are
used to represent triangular and symmetric matrices waste nearly half of the
storage space but provide high performance via the use of Level 3 BLAS.
Standard packed format arrays fully utilize storage (array space) but provide
low performance as there is no Level 3 packed BLAS. We combine the good
features of packed and full storage using RFPF to obtain high performance via
using Level 3 BLAS as RFPF is a standard full format representation. Also, RFPF
requires exactly the same minimal storage as packed format. Each LAPACK full
and/or packed triangular, symmetric, and Hermitian routine becomes a single new
RFPF routine based on eight possible data layouts of RFPF. This new RFPF
routine usually consists of two calls to the corresponding LAPACK full format
routine and two calls to Level 3 BLAS routines. This means {\it no} new
software is required. As examples, we present LAPACK routines for Cholesky
factorization, Cholesky solution and Cholesky inverse computation in RFPF to
illustrate this new work and to describe its performance on several commonly
used computer platforms. Performance of LAPACK full routines using RFPF versus
LAPACK full routines using standard format for both serial and SMP parallel
processing is about the same while using half the storage. Performance gains
are roughly one to a factor of 43 for serial and one to a factor of 97 for SMP
parallel times faster using vendor LAPACK full routines with RFPF than with
using vendor and/or reference packed routines.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 01:08:27 GMT"
}
]
| 2009-01-14T00:00:00 | [
[
"Gustavson",
"Fred G.",
""
],
[
"Wasniewski",
"Jerzy",
""
],
[
"Dongarra",
"Jack J.",
""
],
[
"Langou",
"Julien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0901.1703 | Jubin Jose | Jubin Jose, Alexei Ashikhmin, Thomas L. Marzetta, Sriram Vishwanath | Pilot Contamination and Precoding in Multi-Cell TDD Systems | 23 pages, 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a multi-cell multiple antenna system with precoding used
at the base stations for downlink transmission. For precoding at the base
stations, channel state information (CSI) is essential at the base stations. A
popular technique for obtaining this CSI in time division duplex (TDD) systems
is uplink training by utilizing the reciprocity of the wireless medium. This
paper mathematically characterizes the impact that uplink training has on the
performance of such multi-cell multiple antenna systems. When non-orthogonal
training sequences are used for uplink training, the paper shows that the
precoding matrix used by the base station in one cell becomes corrupted by the
channel between that base station and the users in other cells in an
undesirable manner. This paper analyzes this fundamental problem of pilot
contamination in multi-cell systems. Furthermore, it develops a new multi-cell
MMSE-based precoding method that mitigate this problem. In addition to being a
linear precoding method, this precoding method has a simple closed-form
expression that results from an intuitive optimization problem formulation.
Numerical results show significant performance gains compared to certain
popular single-cell precoding methods.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 02:38:03 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Jun 2010 02:04:01 GMT"
}
]
| 2010-07-01T00:00:00 | [
[
"Jose",
"Jubin",
""
],
[
"Ashikhmin",
"Alexei",
""
],
[
"Marzetta",
"Thomas L.",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1705 | Roy Timo | Roy Timo, Terence Chan and Alexander Grant | Rate-Distortion with Side-Information at Many Decoders | 36 pages. Submitted to IEEE Transactions on Information Theory. In
proc. ISIT 2010. | null | 10.1109/TIT.2011.2158472 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new inner bound for the rate region of the $t$-stage
successive-refinement problem with side-information. We also present a new
upper bound for the rate-distortion function for lossy-source coding with
multiple decoders and side-information. Characterising this rate-distortion
function is a long-standing open problem, and it is widely believed that the
tightest upper bound is provided by Theorem 2 of Heegard and Berger's paper
"Rate Distortion when Side Information may be Absent", \emph{IEEE Trans.
Inform. Theory}, 1985. We give a counterexample to Heegard and Berger's result.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 03:40:20 GMT"
},
{
"version": "v2",
"created": "Sun, 18 Apr 2010 23:34:24 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Timo",
"Roy",
""
],
[
"Chan",
"Terence",
""
],
[
"Grant",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1708 | Kohtaro Tadaki | Kohtaro Tadaki | A statistical mechanical interpretation of instantaneous codes | 5 pages, Proceedings of the 2007 IEEE International Symposium on
Information Theory, pp.1906 - 1910, Nice, France, June 24 - 29, 2007 | null | 10.1109/ISIT.2007.4557499 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we develop a statistical mechanical interpretation of the
noiseless source coding scheme based on an absolutely optimal instantaneous
code. The notions in statistical mechanics such as statistical mechanical
entropy, temperature, and thermal equilibrium are translated into the context
of noiseless source coding. Especially, it is discovered that the temperature 1
corresponds to the average codeword length of an instantaneous code in this
statistical mechanical interpretation of noiseless source coding scheme. This
correspondence is also verified by the investigation using box-counting
dimension. Using the notion of temperature and statistical mechanical
arguments, some information-theoretic relations can be derived in the manner
which appeals to intuition.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 04:49:14 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1732 | Yuval Lomnitz | Yuval Lomnitz, Meir Feder | Feedback Communication over Individual Channels | Final ISIT 2009 version | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of communicating over a channel for which no
mathematical model is specified. We present achievable rates as a function of
the channel input and output sequences known a-posteriori for discrete and
continuous channels. Furthermore we present a rate-adaptive scheme employing
feedback which achieves these rates asymptotically without prior knowledge of
the channel behavior.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 09:17:07 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Aug 2009 15:16:51 GMT"
}
]
| 2009-08-20T00:00:00 | [
[
"Lomnitz",
"Yuval",
""
],
[
"Feder",
"Meir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1737 | Yuval Lomnitz | Yuval Lomnitz, Meir Feder | Power Adaptive Feedback Communication over an Additive Individual Noise
Sequence Channel | Final ISIT 2009 version | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a real-valued additive channel with an individual unknown noise
sequence. We present a simple sequential communication scheme based on the
celebrated Schalkwijk-Kailath scheme, which varies the transmit power according
to the power of the sequence, so that asymptotically the relation between the
SNR and the rate matches the Gaussian channel capacity 1/2 log(1+SNR)for almost
every noise sequence.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 09:37:58 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Aug 2009 15:23:28 GMT"
}
]
| 2009-08-20T00:00:00 | [
[
"Lomnitz",
"Yuval",
""
],
[
"Feder",
"Meir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1753 | Bikash Kumar Dey | S.T. Aditya, Onkar Dabeer, and Bikash Kumar Dey | A Channel Coding Perspective of Recommendation Systems | 5 pages, submitted to ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by recommendation systems, we consider the problem of estimating
block constant binary matrices (of size $m \times n$) from sparse and noisy
observations. The observations are obtained from the underlying block constant
matrix after unknown row and column permutations, erasures, and errors. We
derive upper and lower bounds on the achievable probability of error. For fixed
erasure and error probability, we show that there exists a constant $C_1$ such
that if the cluster sizes are less than $C_1 \ln(mn)$, then for any algorithm
the probability of error approaches one as $m, n \tends \infty$. On the other
hand, we show that a simple polynomial time algorithm gives probability of
error diminishing to zero provided the cluster sizes are greater than $C_2
\ln(mn)$ for a suitable constant $C_2$.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 10:37:52 GMT"
}
]
| 2009-01-14T00:00:00 | [
[
"Aditya",
"S. T.",
""
],
[
"Dabeer",
"Onkar",
""
],
[
"Dey",
"Bikash Kumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0901.1761 | Beat Gfeller | Beat Gfeller, Peter Sanders | Towards Optimal Range Medians | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following problem: given an unsorted array of $n$ elements,
and a sequence of intervals in the array, compute the median in each of the
subarrays defined by the intervals. We describe a simple algorithm which uses
O(n) space and needs $O(n\log k + k\log n)$ time to answer the first $k$
queries. This improves previous algorithms by a logarithmic factor and matches
a lower bound for $k=O(n)$.
Since the algorithm decomposes the range of element values rather than the
array, it has natural generalizations to higher dimensional problems -- it
reduces a range median query to a logarithmic number of range counting queries.
| [
{
"version": "v1",
"created": "Tue, 13 Jan 2009 14:46:50 GMT"
}
]
| 2009-01-14T00:00:00 | [
[
"Gfeller",
"Beat",
""
],
[
"Sanders",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.